mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/08/24 12:08:32
This commit is contained in:
parent
c8d5b70c7e
commit
2a73aa3525
13 changed files with 118 additions and 94 deletions
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 250585913,
|
||||
"name": "CVE-2004-1561",
|
||||
"full_name": "ivanitlearning\/CVE-2004-1561",
|
||||
"owner": {
|
||||
"login": "ivanitlearning",
|
||||
"id": 52420671,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52420671?v=4",
|
||||
"html_url": "https:\/\/github.com\/ivanitlearning"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2004-1561",
|
||||
"description": "Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-27T16:30:22Z",
|
||||
"updated_at": "2020-03-27T17:54:42Z",
|
||||
"pushed_at": "2020-03-27T17:53:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 274131989,
|
||||
"name": "CVE-2004-1561",
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263513846,
|
||||
"name": "shiguresh",
|
||||
"full_name": "Redsplit\/shiguresh",
|
||||
"owner": {
|
||||
"login": "Redsplit",
|
||||
"id": 65139960,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/65139960?v=4",
|
||||
"html_url": "https:\/\/github.com\/Redsplit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Redsplit\/shiguresh",
|
||||
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-13T03:18:46Z",
|
||||
"updated_at": "2020-06-19T02:20:21Z",
|
||||
"pushed_at": "2020-04-21T22:24:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158419232,
|
||||
"name": "4062-1",
|
||||
"full_name": "ngyanch\/4062-1",
|
||||
"owner": {
|
||||
"login": "ngyanch",
|
||||
"id": 26293983,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26293983?v=4",
|
||||
"html_url": "https:\/\/github.com\/ngyanch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ngyanch\/4062-1",
|
||||
"description": "CVE-2008-0128",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-20T16:26:21Z",
|
||||
"updated_at": "2018-11-23T07:10:19Z",
|
||||
"pushed_at": "2018-11-23T07:10:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,28 +44,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 173164801,
|
||||
"name": "debian-ssh",
|
||||
"full_name": "nu11secur1ty\/debian-ssh",
|
||||
"owner": {
|
||||
"login": "nu11secur1ty",
|
||||
"id": 3677559,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3677559?v=4",
|
||||
"html_url": "https:\/\/github.com\/nu11secur1ty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nu11secur1ty\/debian-ssh",
|
||||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166) http:\/\/web.archive.org\/web\/20110723091928\/http:\/\/digitaloffense.net\/tools\/debian-openssl\/",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-28T18:22:06Z",
|
||||
"updated_at": "2019-07-09T17:47:06Z",
|
||||
"pushed_at": "2019-02-28T18:30:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3490.json
Normal file
25
2010/CVE-2010-3490.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 226908489,
|
||||
"name": "CVE-2010-3490",
|
||||
"full_name": "moayadalmalat\/CVE-2010-3490",
|
||||
"owner": {
|
||||
"login": "moayadalmalat",
|
||||
"id": 42471675,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42471675?v=4",
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2010-3490",
|
||||
"description": "FreePBX exploit <= 2.8.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-09T15:49:21Z",
|
||||
"updated_at": "2019-12-09T15:57:52Z",
|
||||
"pushed_at": "2019-12-09T15:57:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1305,8 +1305,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 754,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1773,14 +1773,14 @@
|
|||
{
|
||||
"id": 191491863,
|
||||
"name": "CVE-2019-0708-Msf--",
|
||||
"full_name": "cream492\/CVE-2019-0708-Msf--",
|
||||
"full_name": "cream-sec\/CVE-2019-0708-Msf--",
|
||||
"owner": {
|
||||
"login": "cream492",
|
||||
"login": "cream-sec",
|
||||
"id": 29266660,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29266660?v=4",
|
||||
"html_url": "https:\/\/github.com\/cream492"
|
||||
"html_url": "https:\/\/github.com\/cream-sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cream492\/CVE-2019-0708-Msf--",
|
||||
"html_url": "https:\/\/github.com\/cream-sec\/CVE-2019-0708-Msf--",
|
||||
"description": "CVE-2019-0708-Msf-验证",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T03:37:39Z",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-22T13:28:14Z",
|
||||
"updated_at": "2020-08-24T01:47:20Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1526,
|
||||
"watchers_count": 1526,
|
||||
"forks_count": 397,
|
||||
"forks": 397,
|
||||
"watchers": 1526,
|
||||
"stargazers_count": 1527,
|
||||
"watchers_count": 1527,
|
||||
"forks_count": 398,
|
||||
"forks": 398,
|
||||
"watchers": 1527,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit CVE-2020-13886 - LFI Intelbras TIP 200 \/ 200 LITE \/ ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T20:52:04Z",
|
||||
"updated_at": "2020-08-06T22:43:54Z",
|
||||
"pushed_at": "2020-08-04T20:14:54Z",
|
||||
"updated_at": "2020-08-23T23:19:46Z",
|
||||
"pushed_at": "2020-08-23T23:19:44Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2020-08-23T07:03:54Z",
|
||||
"updated_at": "2020-08-23T22:33:58Z",
|
||||
"pushed_at": "2020-07-18T11:52:31Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-08-22T06:33:07Z",
|
||||
"updated_at": "2020-08-24T01:39:40Z",
|
||||
"pushed_at": "2020-08-20T07:56:36Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-22T13:28:14Z",
|
||||
"updated_at": "2020-08-24T01:47:20Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1526,
|
||||
"watchers_count": 1526,
|
||||
"forks_count": 397,
|
||||
"forks": 397,
|
||||
"watchers": 1526,
|
||||
"stargazers_count": 1527,
|
||||
"watchers_count": 1527,
|
||||
"forks_count": 398,
|
||||
"forks": 398,
|
||||
"watchers": 1527,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Proof of concept for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T17:01:27Z",
|
||||
"updated_at": "2020-08-10T11:23:37Z",
|
||||
"updated_at": "2020-08-24T02:01:44Z",
|
||||
"pushed_at": "2020-07-06T17:47:17Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T01:27:08Z",
|
||||
"updated_at": "2020-03-15T05:45:55Z",
|
||||
"updated_at": "2020-08-23T22:22:47Z",
|
||||
"pushed_at": "2020-02-28T02:22:03Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
21
README.md
21
README.md
|
@ -2153,7 +2153,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [Wileysec/CVE-2019-0708-Batch-Blue-Screen](https://github.com/Wileysec/CVE-2019-0708-Batch-Blue-Screen)
|
||||
- [Pa55w0rd/CVE-2019-0708](https://github.com/Pa55w0rd/CVE-2019-0708)
|
||||
- [at0mik/CVE-2019-0708-PoC](https://github.com/at0mik/CVE-2019-0708-PoC)
|
||||
- [cream492/CVE-2019-0708-Msf--](https://github.com/cream492/CVE-2019-0708-Msf--)
|
||||
- [cream-sec/CVE-2019-0708-Msf--](https://github.com/cream-sec/CVE-2019-0708-Msf--)
|
||||
- [wdfcc/CVE-2019-0708](https://github.com/wdfcc/CVE-2019-0708)
|
||||
- [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708)
|
||||
- [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp)
|
||||
|
@ -14211,6 +14211,14 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
|
|||
|
||||
- [huang-emily/CVE-2010-3437](https://github.com/huang-emily/CVE-2010-3437)
|
||||
|
||||
### CVE-2010-3490
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root.
|
||||
</code>
|
||||
|
||||
- [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490)
|
||||
|
||||
### CVE-2010-3600
|
||||
|
||||
<code>
|
||||
|
@ -14437,14 +14445,6 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
|
|||
|
||||
|
||||
## 2008
|
||||
### CVE-2008-0128
|
||||
|
||||
<code>
|
||||
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
|
||||
</code>
|
||||
|
||||
- [ngyanch/4062-1](https://github.com/ngyanch/4062-1)
|
||||
|
||||
### CVE-2008-0166
|
||||
|
||||
<code>
|
||||
|
@ -14453,7 +14453,6 @@ OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating system
|
|||
|
||||
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
|
||||
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
|
||||
- [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh)
|
||||
|
||||
### CVE-2008-0228
|
||||
|
||||
|
@ -14733,6 +14732,7 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows
|
|||
Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.
|
||||
</code>
|
||||
|
||||
- [ivanitlearning/CVE-2004-1561](https://github.com/ivanitlearning/CVE-2004-1561)
|
||||
- [darrynb89/CVE-2004-1561](https://github.com/darrynb89/CVE-2004-1561)
|
||||
|
||||
### CVE-2004-1769
|
||||
|
@ -14742,6 +14742,7 @@ The "Allow cPanel users to reset their password via email" feature in
|
|||
</code>
|
||||
|
||||
- [sinkaroid/shiguresh](https://github.com/sinkaroid/shiguresh)
|
||||
- [Redsplit/shiguresh](https://github.com/Redsplit/shiguresh)
|
||||
|
||||
### CVE-2004-2167
|
||||
|
||||
|
|
Loading…
Reference in a new issue