mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/09/17 18:13:02
This commit is contained in:
parent
8467c9f070
commit
12958cd6d5
24 changed files with 146 additions and 112 deletions
|
@ -133,14 +133,14 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-22T04:01:38Z",
|
||||
"updated_at": "2021-03-11T23:59:40Z",
|
||||
"updated_at": "2021-09-17T03:35:29Z",
|
||||
"pushed_at": "2017-04-22T04:01:54Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"forks": 13,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 52,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"forks": 52,
|
||||
"forks": 53,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -589,14 +589,14 @@
|
|||
"description": " (CVE-2017-10271)Java反序列化漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-05T13:33:56Z",
|
||||
"updated_at": "2020-07-03T04:06:16Z",
|
||||
"updated_at": "2021-09-17T05:08:34Z",
|
||||
"pushed_at": "2019-11-05T13:35:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -89,9 +89,9 @@
|
|||
"pushed_at": "2019-06-06T14:53:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2021-06-29T22:55:53Z",
|
||||
"updated_at": "2021-09-17T06:17:10Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"forks": 17,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -65,9 +65,9 @@
|
|||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"forks_count": 165,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
"forks": 165,
|
||||
"forks": 166,
|
||||
"watchers": 468,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -85,14 +85,14 @@
|
|||
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2021-08-25T09:48:04Z",
|
||||
"updated_at": "2021-09-17T07:46:08Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,9 +41,9 @@
|
|||
"pushed_at": "2019-02-22T07:47:26Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -137,9 +137,9 @@
|
|||
"pushed_at": "2021-01-01T06:10:58Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-16T13:34:25Z",
|
||||
"updated_at": "2021-09-17T07:47:57Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2871,
|
||||
"watchers_count": 2871,
|
||||
"stargazers_count": 2873,
|
||||
"watchers_count": 2873,
|
||||
"forks_count": 839,
|
||||
"allow_forking": true,
|
||||
"forks": 839,
|
||||
"watchers": 2871,
|
||||
"watchers": 2873,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -65,9 +65,9 @@
|
|||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"forks_count": 129,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
"forks": 129,
|
||||
"forks": 130,
|
||||
"watchers": 532,
|
||||
"score": 0
|
||||
},
|
||||
|
|
26
2019/CVE-2019-6260.json
Normal file
26
2019/CVE-2019-6260.json
Normal file
|
@ -0,0 +1,26 @@
|
|||
[
|
||||
{
|
||||
"id": 369476141,
|
||||
"name": "cve-2019-6260",
|
||||
"full_name": "nikitapbst\/cve-2019-6260",
|
||||
"owner": {
|
||||
"login": "nikitapbst",
|
||||
"id": 76496360,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76496360?v=4",
|
||||
"html_url": "https:\/\/github.com\/nikitapbst"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nikitapbst\/cve-2019-6260",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-21T09:01:05Z",
|
||||
"updated_at": "2021-09-17T07:55:05Z",
|
||||
"pushed_at": "2021-05-21T09:02:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,14 +13,14 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2021-09-09T06:30:53Z",
|
||||
"updated_at": "2021-09-17T05:46:36Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 55,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"forks": 55,
|
||||
"watchers": 173,
|
||||
"forks": 56,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-16T13:34:25Z",
|
||||
"updated_at": "2021-09-17T07:47:57Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2871,
|
||||
"watchers_count": 2871,
|
||||
"stargazers_count": 2873,
|
||||
"watchers_count": 2873,
|
||||
"forks_count": 839,
|
||||
"allow_forking": true,
|
||||
"forks": 839,
|
||||
"watchers": 2871,
|
||||
"watchers": 2873,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2021-09-06T15:05:21Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 285,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -65,9 +65,9 @@
|
|||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 58,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"forks": 58,
|
||||
"forks": 59,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-09-17T01:59:32Z",
|
||||
"updated_at": "2021-09-17T04:04:16Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1377,
|
||||
"watchers_count": 1377,
|
||||
"forks_count": 501,
|
||||
"allow_forking": true,
|
||||
"forks": 501,
|
||||
"watchers": 1376,
|
||||
"watchers": 1377,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -493,14 +493,14 @@
|
|||
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T09:50:39Z",
|
||||
"updated_at": "2021-08-31T12:34:53Z",
|
||||
"updated_at": "2021-09-17T08:02:28Z",
|
||||
"pushed_at": "2021-07-04T09:57:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -541,14 +541,14 @@
|
|||
"description": "CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T14:17:03Z",
|
||||
"updated_at": "2021-09-13T13:55:45Z",
|
||||
"updated_at": "2021-09-17T03:54:34Z",
|
||||
"pushed_at": "2021-07-05T14:34:34Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"forks": 22,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-09-14T06:42:41Z",
|
||||
"updated_at": "2021-09-17T08:02:26Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
"forks": 84,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -133,14 +133,14 @@
|
|||
"description": "Read my blog for more info - ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T12:55:15Z",
|
||||
"updated_at": "2021-08-31T12:34:52Z",
|
||||
"updated_at": "2021-09-17T08:02:27Z",
|
||||
"pushed_at": "2021-04-27T21:13:18Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,14 +109,14 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-09-16T11:33:05Z",
|
||||
"updated_at": "2021-09-17T09:09:18Z",
|
||||
"pushed_at": "2021-09-10T19:42:33Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"forks_count": 50,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"forks": 50,
|
||||
"watchers": 213,
|
||||
"forks": 51,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -209,9 +209,9 @@
|
|||
"pushed_at": "2021-09-02T07:09:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -397,14 +397,14 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-09-16T12:47:32Z",
|
||||
"updated_at": "2021-09-17T09:11:31Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"stargazers_count": 762,
|
||||
"watchers_count": 762,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
"forks": 220,
|
||||
"watchers": 761,
|
||||
"watchers": 762,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-13T06:15:21Z",
|
||||
"updated_at": "2021-09-16T08:33:27Z",
|
||||
"updated_at": "2021-09-17T08:33:36Z",
|
||||
"pushed_at": "2021-07-13T06:16:11Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"watchers": 26,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "TP Seguridad Informática",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-09T12:55:55Z",
|
||||
"updated_at": "2021-09-09T12:56:56Z",
|
||||
"pushed_at": "2021-09-09T12:56:53Z",
|
||||
"updated_at": "2021-09-17T03:34:31Z",
|
||||
"pushed_at": "2021-09-17T03:34:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-16T02:11:36Z",
|
||||
"updated_at": "2021-09-17T03:03:02Z",
|
||||
"updated_at": "2021-09-17T09:10:06Z",
|
||||
"pushed_at": "2021-09-16T10:39:04Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 11,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"forks": 11,
|
||||
"watchers": 37,
|
||||
"forks": 18,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -65,9 +65,9 @@
|
|||
"pushed_at": "2021-09-16T14:50:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -205,14 +205,14 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-09-17T03:18:54Z",
|
||||
"updated_at": "2021-09-17T09:01:20Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1078,
|
||||
"watchers_count": 1078,
|
||||
"forks_count": 350,
|
||||
"stargazers_count": 1091,
|
||||
"watchers_count": 1091,
|
||||
"forks_count": 351,
|
||||
"allow_forking": true,
|
||||
"forks": 350,
|
||||
"watchers": 1078,
|
||||
"forks": 351,
|
||||
"watchers": 1091,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -373,14 +373,14 @@
|
|||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-12T18:05:53Z",
|
||||
"updated_at": "2021-09-17T01:53:57Z",
|
||||
"updated_at": "2021-09-17T07:35:23Z",
|
||||
"pushed_at": "2021-09-15T16:34:35Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"forks": 38,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -445,14 +445,14 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-14T17:10:48Z",
|
||||
"updated_at": "2021-09-16T02:05:47Z",
|
||||
"updated_at": "2021-09-17T08:01:45Z",
|
||||
"pushed_at": "2021-09-14T17:19:26Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -469,14 +469,14 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-09-17T03:11:22Z",
|
||||
"updated_at": "2021-09-17T09:13:03Z",
|
||||
"pushed_at": "2021-09-16T11:16:34Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 22,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"forks": 22,
|
||||
"watchers": 89,
|
||||
"forks": 28,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -8070,6 +8070,14 @@ An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability that can
|
|||
|
||||
- [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms)
|
||||
|
||||
### CVE-2019-6260 (2019-01-22)
|
||||
|
||||
<code>
|
||||
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console uart is attached to a serial concentrator). This CVE applies to the specific cases of iLPC2AHB bridge Pt I, iLPC2AHB bridge Pt II, PCIe VGA P2A bridge, DMA from/to arbitrary BMC memory via X-DMA, UART-based SoC Debug interface, LPC2AHB bridge, PCIe BMC P2A bridge, and Watchdog setup.
|
||||
</code>
|
||||
|
||||
- [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260)
|
||||
|
||||
### CVE-2019-6263 (2019-01-16)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue