mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/10/30 06:09:02
This commit is contained in:
parent
b852f555d9
commit
297890e4c7
16 changed files with 112 additions and 59 deletions
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 234,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2018-07-12T08:35:13Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2020-10-26T18:56:28Z",
|
||||
"updated_at": "2020-10-29T17:14:35Z",
|
||||
"pushed_at": "2020-03-23T11:22:54Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-07T19:44:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-10-29T08:56:32Z",
|
||||
"updated_at": "2020-10-29T19:29:44Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"stargazers_count": 659,
|
||||
"watchers_count": 659,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 658,
|
||||
"watchers": 659,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 234,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-10-26T15:15:35Z",
|
||||
"updated_at": "2020-10-29T17:26:14Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -366,5 +366,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308367304,
|
||||
"name": "CVE-2020-0688-Scanner",
|
||||
"full_name": "SLSteff\/CVE-2020-0688-Scanner",
|
||||
"owner": {
|
||||
"login": "SLSteff",
|
||||
"id": 20557573,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/20557573?v=4",
|
||||
"html_url": "https:\/\/github.com\/SLSteff"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SLSteff\/CVE-2020-0688-Scanner",
|
||||
"description": "Scans for Microsoft Exchange Versions with masscan",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:16:24Z",
|
||||
"updated_at": "2020-10-29T20:06:27Z",
|
||||
"pushed_at": "2020-10-29T20:06:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-10-28T07:01:57Z",
|
||||
"updated_at": "2020-10-29T16:57:48Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 1027,
|
||||
"watchers_count": 1027,
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"forks_count": 337,
|
||||
"forks": 337,
|
||||
"watchers": 1027,
|
||||
"watchers": 1028,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T18:45:24Z",
|
||||
"updated_at": "2020-09-25T01:50:48Z",
|
||||
"updated_at": "2020-10-29T20:05:11Z",
|
||||
"pushed_at": "2020-06-25T12:22:06Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2020-10-29T07:48:17Z",
|
||||
"updated_at": "2020-10-29T17:48:53Z",
|
||||
"pushed_at": "2020-10-06T06:58:55Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,13 +772,13 @@
|
|||
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-29T20:43:06Z",
|
||||
"updated_at": "2020-10-27T22:33:26Z",
|
||||
"updated_at": "2020-10-29T18:47:32Z",
|
||||
"pushed_at": "2020-10-02T13:00:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-10-29T14:49:59Z",
|
||||
"pushed_at": "2020-10-29T14:49:57Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"updated_at": "2020-10-29T16:40:17Z",
|
||||
"pushed_at": "2020-10-29T15:31:20Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-14882 Weblogic-Exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T06:30:30Z",
|
||||
"updated_at": "2020-10-29T13:59:22Z",
|
||||
"updated_at": "2020-10-29T20:44:13Z",
|
||||
"pushed_at": "2020-10-29T06:36:01Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -113,5 +113,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308374913,
|
||||
"name": "cve-2020-14882",
|
||||
"full_name": "wsfengfan\/cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "wsfengfan",
|
||||
"id": 33821840,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsfengfan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
|
||||
"description": "CVE-2020-14882 GET POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:44:23Z",
|
||||
"updated_at": "2020-10-29T16:16:31Z",
|
||||
"pushed_at": "2020-10-29T16:07:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T02:38:15Z",
|
||||
"updated_at": "2020-10-29T13:40:08Z",
|
||||
"updated_at": "2020-10-29T19:01:40Z",
|
||||
"pushed_at": "2020-10-09T16:39:54Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,11 +14,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-20T04:27:52Z",
|
||||
"updated_at": "2020-10-28T17:08:04Z",
|
||||
"pushed_at": "2020-06-24T20:57:03Z",
|
||||
"pushed_at": "2020-10-29T16:54:16Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -217,6 +217,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||
- [w4fz5uck5/cve-2020-0688-webshell-upload-technique](https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique)
|
||||
- [murataydemir/CVE-2020-0688](https://github.com/murataydemir/CVE-2020-0688)
|
||||
- [zyn3rgy/ecp_slap](https://github.com/zyn3rgy/ecp_slap)
|
||||
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
|
||||
|
||||
### CVE-2020-0708 (2020-02-11)
|
||||
|
||||
|
@ -2176,6 +2177,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [Umarovm/McMaster-University-0-day-Blind-Command-Injection](https://github.com/Umarovm/McMaster-University-0-day-Blind-Command-Injection)
|
||||
- [RedTeamWing/CVE-2020-14882](https://github.com/RedTeamWing/CVE-2020-14882)
|
||||
- [0thm4n3/cve-2020-14882](https://github.com/0thm4n3/cve-2020-14882)
|
||||
- [wsfengfan/cve-2020-14882](https://github.com/wsfengfan/cve-2020-14882)
|
||||
|
||||
### CVE-2020-14947 (2020-06-30)
|
||||
|
||||
|
@ -2644,7 +2646,12 @@ An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-
|
|||
### CVE-2020-27199
|
||||
- [9lyph/CVE-2020-27199](https://github.com/9lyph/CVE-2020-27199)
|
||||
|
||||
### CVE-2020-27747
|
||||
### CVE-2020-27747 (2020-10-29)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the user of the system has assigned himself a PIN code for entering from a mobile device using the built-in generator (4 digits), a remote attacker has the opportunity to conduct a brute force attack on this PIN code. As result, remote attacker retrieves all passwords from another systems, available for affected account.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
|
||||
|
||||
### CVE-2020-72381
|
||||
|
|
Loading…
Reference in a new issue