mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/10/14 00:09:17
This commit is contained in:
parent
9eed7c91c6
commit
13a5d7618b
22 changed files with 117 additions and 93 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2020-09-29T21:07:22Z",
|
||||
"updated_at": "2020-10-13T12:48:08Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2016-4622",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-09T15:22:06Z",
|
||||
"updated_at": "2020-09-27T08:27:05Z",
|
||||
"updated_at": "2020-10-13T12:04:41Z",
|
||||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2020-10-10T02:19:59Z",
|
||||
"updated_at": "2020-10-13T11:18:56Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"forks_count": 282,
|
||||
"forks": 282,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2020-10-12T09:51:52Z",
|
||||
"updated_at": "2020-10-13T12:18:30Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 429,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-04T20:41:12Z",
|
||||
"updated_at": "2020-09-30T09:13:12Z",
|
||||
"updated_at": "2020-10-13T12:20:38Z",
|
||||
"pushed_at": "2018-02-28T07:04:05Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2020-10-09T09:07:44Z",
|
||||
"updated_at": "2020-10-13T09:42:39Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 474,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-17T17:08:22Z",
|
||||
"updated_at": "2018-12-21T08:28:16Z",
|
||||
"updated_at": "2020-10-13T11:26:22Z",
|
||||
"pushed_at": "2017-10-23T19:39:21Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "fixed msf module for cve-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-30T22:20:36Z",
|
||||
"updated_at": "2020-09-12T15:36:50Z",
|
||||
"updated_at": "2020-10-13T13:30:11Z",
|
||||
"pushed_at": "2017-03-30T22:20:51Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-13T22:09:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "CVE-2018-9995 هک دوربین مداربسته با آسیب پذیری ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-13T05:00:21Z",
|
||||
"updated_at": "2020-08-16T13:34:16Z",
|
||||
"updated_at": "2020-10-13T10:12:25Z",
|
||||
"pushed_at": "2020-06-13T05:09:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-19T12:03:44Z",
|
||||
"updated_at": "2020-10-13T07:25:20Z",
|
||||
"updated_at": "2020-10-13T12:08:49Z",
|
||||
"pushed_at": "2020-07-19T12:23:34Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-14T10:16:02Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-10-13T07:13:49Z",
|
||||
"updated_at": "2020-10-13T11:22:21Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1609,
|
||||
"watchers_count": 1609,
|
||||
"stargazers_count": 1608,
|
||||
"watchers_count": 1608,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1609,
|
||||
"watchers": 1608,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2020-10-12T11:44:50Z",
|
||||
"updated_at": "2020-10-13T11:57:47Z",
|
||||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"watchers": 332,
|
||||
"watchers": 333,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-10-06T02:27:03Z",
|
||||
"updated_at": "2020-10-13T13:51:19Z",
|
||||
"pushed_at": "2020-08-28T14:09:20Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T21:34:16Z",
|
||||
"updated_at": "2020-09-25T15:34:04Z",
|
||||
"updated_at": "2020-10-13T14:57:48Z",
|
||||
"pushed_at": "2020-08-11T21:48:12Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2020-03-12T14:03:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-17T12:15:56Z",
|
||||
"updated_at": "2020-10-10T13:49:58Z",
|
||||
"updated_at": "2020-10-13T12:09:49Z",
|
||||
"pushed_at": "2020-09-26T13:33:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-10-13T01:06:40Z",
|
||||
"updated_at": "2020-10-13T10:04:09Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 657,
|
||||
"watchers_count": 657,
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 657,
|
||||
"watchers": 658,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-10-13T07:23:03Z",
|
||||
"updated_at": "2020-10-13T11:07:08Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 183,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,13 +335,13 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2020-10-12T09:56:31Z",
|
||||
"updated_at": "2020-10-13T14:19:18Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 246425449,
|
||||
"name": "CVE-2020-1947",
|
||||
"full_name": "5l1v3r1\/CVE-2020-1947",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-1947",
|
||||
"description": "CVE-2020-1947 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T22:55:43Z",
|
||||
"updated_at": "2020-10-13T11:46:58Z",
|
||||
"pushed_at": "2020-03-10T12:48:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246463480,
|
||||
"name": "CVE-2020-1947",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T05:35:01Z",
|
||||
"updated_at": "2020-10-12T16:14:31Z",
|
||||
"updated_at": "2020-10-13T11:04:34Z",
|
||||
"pushed_at": "2020-01-22T04:58:59Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-10-10T21:24:56Z",
|
||||
"updated_at": "2020-10-13T11:11:46Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T04:03:58Z",
|
||||
"updated_at": "2020-10-10T21:25:03Z",
|
||||
"updated_at": "2020-10-13T11:11:34Z",
|
||||
"pushed_at": "2020-07-28T08:43:11Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1002,13 +1002,13 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2020-10-10T21:25:12Z",
|
||||
"updated_at": "2020-10-13T11:11:38Z",
|
||||
"pushed_at": "2020-07-12T10:36:20Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -594,6 +594,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2020-1947](https://github.com/5l1v3r1/CVE-2020-1947)
|
||||
- [jas502n/CVE-2020-1947](https://github.com/jas502n/CVE-2020-1947)
|
||||
- [wsfengfan/CVE-2020-1947](https://github.com/wsfengfan/CVE-2020-1947)
|
||||
- [shadowsock5/ShardingSphere_CVE-2020-1947](https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947)
|
||||
|
|
Loading…
Reference in a new issue