mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/04/19 06:07:56
This commit is contained in:
parent
9dbb5fa76b
commit
2bd7a2f051
38 changed files with 351 additions and 237 deletions
|
@ -67,28 +67,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 247077498,
|
||||
"name": "CVE-2003-0264-SLmail-5.5",
|
||||
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"owner": {
|
||||
"login": "pwncone",
|
||||
"id": 57570315,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57570315?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwncone"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T13:27:56Z",
|
||||
"updated_at": "2020-03-13T13:31:38Z",
|
||||
"pushed_at": "2020-03-13T13:31:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2020-04-14T12:05:16Z",
|
||||
"updated_at": "2020-04-18T20:37:49Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 255,
|
||||
"watchers": 254,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2015-01-27T09:43:42Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2015-05-11T22:39:06Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-01-15T19:26:45Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2020-04-14T05:37:03Z",
|
||||
"updated_at": "2020-04-18T20:39:02Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 169,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2018-0824",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-15T08:59:37Z",
|
||||
"updated_at": "2020-03-26T17:16:09Z",
|
||||
"updated_at": "2020-04-18T15:42:40Z",
|
||||
"pushed_at": "2018-06-25T07:13:36Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"forks_count": 302,
|
||||
"forks": 302,
|
||||
"forks_count": 303,
|
||||
"forks": 303,
|
||||
"watchers": 327,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 394,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T21:06:26Z",
|
||||
"updated_at": "2020-04-18T06:18:24Z",
|
||||
"updated_at": "2020-04-18T20:26:35Z",
|
||||
"pushed_at": "2020-04-13T22:09:50Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1098,
|
||||
"watchers_count": 1098,
|
||||
"forks_count": 369,
|
||||
"forks": 369,
|
||||
"forks_count": 370,
|
||||
"forks": 370,
|
||||
"watchers": 1098,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1558,8 +1558,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1017,
|
||||
"watchers_count": 1017,
|
||||
"forks_count": 348,
|
||||
"forks": 348,
|
||||
"forks_count": 349,
|
||||
"forks": 349,
|
||||
"watchers": 1017,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-04-14T19:07:32Z",
|
||||
"updated_at": "2020-04-18T15:56:01Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"forks_count": 221,
|
||||
"forks": 221,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-04-18T01:20:34Z",
|
||||
"updated_at": "2020-04-18T20:59:17Z",
|
||||
"pushed_at": "2019-12-28T18:23:58Z",
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"stargazers_count": 562,
|
||||
"watchers_count": 562,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 563,
|
||||
"watchers": 562,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2020-04-16T05:40:05Z",
|
||||
"updated_at": "2020-04-18T20:55:50Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 226,
|
||||
"watchers": 225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-04-15T16:53:59Z",
|
||||
"updated_at": "2020-04-18T18:16:58Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 93,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-04-18T10:36:50Z",
|
||||
"updated_at": "2020-04-18T19:33:11Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 139,
|
||||
"watchers": 140,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-20T21:20:28Z",
|
||||
"updated_at": "2019-11-16T09:47:14Z",
|
||||
"updated_at": "2020-04-18T15:08:01Z",
|
||||
"pushed_at": "2019-11-16T09:47:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-17558 Solr模板注入漏洞图形化一键检测工具。CVE-2019-17558 Solr Velocity Template Vul POC Tool.",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-25T10:54:20Z",
|
||||
"updated_at": "2020-04-03T03:05:54Z",
|
||||
"updated_at": "2020-04-18T15:23:46Z",
|
||||
"pushed_at": "2020-01-10T10:58:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-10-15T01:04:08Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-18T14:52:36Z",
|
||||
"updated_at": "2020-04-18T17:11:17Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 566,
|
||||
"watchers_count": 566,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 566,
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 570,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2020-04-18T03:04:48Z",
|
||||
"updated_at": "2020-04-18T16:11:28Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T09:19:10Z",
|
||||
"updated_at": "2020-04-11T13:12:33Z",
|
||||
"updated_at": "2020-04-18T15:23:33Z",
|
||||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2020-04-06T10:45:56Z",
|
||||
"updated_at": "2020-04-18T16:11:18Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"forks_count": 104,
|
||||
"forks": 104,
|
||||
"watchers": 507,
|
||||
"watchers": 508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-04-18T04:55:07Z",
|
||||
"updated_at": "2020-04-18T19:55:15Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-04-16T20:32:50Z",
|
||||
"updated_at": "2020-04-18T15:09:38Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -299,26 +299,26 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255688881,
|
||||
"id": 256843461,
|
||||
"name": "CVE-2020-0688",
|
||||
"full_name": "curtbraz\/CVE-2020-0688",
|
||||
"full_name": "l33terman6000\/CVE-2020-0688",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
"login": "l33terman6000",
|
||||
"id": 63928955,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0688",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0688",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T18:14:12Z",
|
||||
"updated_at": "2020-04-16T13:25:20Z",
|
||||
"pushed_at": "2020-04-14T18:14:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"created_at": "2020-04-18T20:09:06Z",
|
||||
"updated_at": "2020-04-18T20:25:02Z",
|
||||
"pushed_at": "2020-04-18T20:25:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-0692.json
Normal file
25
2020/CVE-2020-0692.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 256222085,
|
||||
"name": "CVE-2020-0692",
|
||||
"full_name": "githubassets\/CVE-2020-0692",
|
||||
"owner": {
|
||||
"login": "githubassets",
|
||||
"id": 59461072,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
|
||||
"html_url": "https:\/\/github.com\/githubassets"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0692",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T13:25:29Z",
|
||||
"updated_at": "2020-04-18T19:40:16Z",
|
||||
"pushed_at": "2020-04-14T18:14:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-18T12:41:49Z",
|
||||
"updated_at": "2020-04-18T19:16:02Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 827,
|
||||
"watchers_count": 827,
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 827,
|
||||
"watchers": 829,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1218,29 +1218,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255671853,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "curtbraz\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0796",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T17:03:53Z",
|
||||
"updated_at": "2020-04-16T13:33:35Z",
|
||||
"pushed_at": "2020-04-14T17:52:10Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256781307,
|
||||
"name": "CVE-2020-0796",
|
||||
|
@ -1255,8 +1232,31 @@
|
|||
"description": "PoC with remote code execution module for CVE-2020-0796 aka SMBGhost.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-18T15:01:28Z",
|
||||
"updated_at": "2020-04-18T15:01:41Z",
|
||||
"updated_at": "2020-04-18T18:38:10Z",
|
||||
"pushed_at": "2020-04-18T15:01:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256842563,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "l33terman6000\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "l33terman6000",
|
||||
"id": 63928955,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0796",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-18T20:03:29Z",
|
||||
"updated_at": "2020-04-18T20:25:52Z",
|
||||
"pushed_at": "2020-04-18T20:25:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
25
2020/CVE-2020-0798.json
Normal file
25
2020/CVE-2020-0798.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 256224132,
|
||||
"name": "CVE-2020-0798",
|
||||
"full_name": "githubassets\/CVE-2020-0798",
|
||||
"owner": {
|
||||
"login": "githubassets",
|
||||
"id": 59461072,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
|
||||
"html_url": "https:\/\/github.com\/githubassets"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0798",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T13:33:35Z",
|
||||
"updated_at": "2020-04-18T19:40:51Z",
|
||||
"pushed_at": "2020-04-14T17:52:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 255705748,
|
||||
"id": 256224033,
|
||||
"name": "CVE-2020-0883",
|
||||
"full_name": "curtbraz\/CVE-2020-0883",
|
||||
"full_name": "githubassets\/CVE-2020-0883",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
"login": "githubassets",
|
||||
"id": 59461072,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
|
||||
"html_url": "https:\/\/github.com\/githubassets"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0883",
|
||||
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0883",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0883",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:28:08Z",
|
||||
"updated_at": "2020-04-16T13:33:11Z",
|
||||
"created_at": "2020-04-16T13:33:11Z",
|
||||
"updated_at": "2020-04-18T19:39:17Z",
|
||||
"pushed_at": "2020-04-14T19:28:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256842867,
|
||||
"name": "CVE-2020-0883",
|
||||
"full_name": "l33terman6000\/CVE-2020-0883",
|
||||
"owner": {
|
||||
"login": "l33terman6000",
|
||||
"id": 63928955,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0883",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0883",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-18T20:05:21Z",
|
||||
"updated_at": "2020-04-18T20:26:14Z",
|
||||
"pushed_at": "2020-04-18T20:26:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 255703243,
|
||||
"id": 256224375,
|
||||
"name": "CVE-2020-0905",
|
||||
"full_name": "curtbraz\/CVE-2020-0905",
|
||||
"full_name": "githubassets\/CVE-2020-0905",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
"login": "githubassets",
|
||||
"id": 59461072,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59461072?v=4",
|
||||
"html_url": "https:\/\/github.com\/githubassets"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-0905",
|
||||
"html_url": "https:\/\/github.com\/githubassets\/CVE-2020-0905",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0905",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:17:02Z",
|
||||
"updated_at": "2020-04-16T13:34:36Z",
|
||||
"created_at": "2020-04-16T13:34:37Z",
|
||||
"updated_at": "2020-04-18T19:39:46Z",
|
||||
"pushed_at": "2020-04-14T19:17:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256843272,
|
||||
"name": "CVE-2020-0905",
|
||||
"full_name": "l33terman6000\/CVE-2020-0905",
|
||||
"owner": {
|
||||
"login": "l33terman6000",
|
||||
"id": 63928955,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-0905",
|
||||
"description": "PoC RCE Reverse Shell for CVE-2020-0905",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-18T20:07:49Z",
|
||||
"updated_at": "2020-04-18T20:26:36Z",
|
||||
"pushed_at": "2020-04-18T20:26:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-18T14:52:36Z",
|
||||
"updated_at": "2020-04-18T17:11:17Z",
|
||||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 566,
|
||||
"watchers_count": 566,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 566,
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 570,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T07:48:50Z",
|
||||
"updated_at": "2020-04-18T13:32:50Z",
|
||||
"updated_at": "2020-04-18T15:50:17Z",
|
||||
"pushed_at": "2020-02-21T10:19:52Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 255758745,
|
||||
"name": "CVE-2020-3952",
|
||||
"full_name": "curtbraz\/CVE-2020-3952",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-3952",
|
||||
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-15T00:13:35Z",
|
||||
"updated_at": "2020-04-17T07:34:56Z",
|
||||
"pushed_at": "2020-04-15T00:13:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255764753,
|
||||
"name": "CVE-2020-3952",
|
||||
|
@ -45,6 +22,29 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256080140,
|
||||
"name": "CVE-2020-3952",
|
||||
"full_name": "frustreated\/CVE-2020-3952",
|
||||
"owner": {
|
||||
"login": "frustreated",
|
||||
"id": 5463104,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5463104?v=4",
|
||||
"html_url": "https:\/\/github.com\/frustreated"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952",
|
||||
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T01:39:33Z",
|
||||
"updated_at": "2020-04-18T19:38:42Z",
|
||||
"pushed_at": "2020-04-15T00:13:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256143992,
|
||||
"name": "vmware_vcenter_cve_2020_3952",
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-04-18T14:37:34Z",
|
||||
"updated_at": "2020-04-18T20:42:41Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 100,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 256842008,
|
||||
"name": "CVE-2020-3952",
|
||||
"full_name": "l33terman6000\/CVE-2020-3952",
|
||||
"owner": {
|
||||
"login": "l33terman6000",
|
||||
"id": 63928955,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/63928955?v=4",
|
||||
"html_url": "https:\/\/github.com\/l33terman6000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l33terman6000\/CVE-2020-3952",
|
||||
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-18T20:00:20Z",
|
||||
"updated_at": "2020-04-18T20:25:30Z",
|
||||
"pushed_at": "2020-04-18T20:25:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2020-04-14T12:31:21Z",
|
||||
"updated_at": "2020-04-18T15:44:15Z",
|
||||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "WP: CodeSnippets (CVE-2020-8417)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-06T00:03:14Z",
|
||||
"updated_at": "2020-04-18T02:57:57Z",
|
||||
"pushed_at": "2020-04-18T02:57:55Z",
|
||||
"updated_at": "2020-04-18T19:15:31Z",
|
||||
"pushed_at": "2020-04-18T19:15:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
30
README.md
30
README.md
|
@ -159,7 +159,15 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||
- [cert-lv/CVE-2020-0688](https://github.com/cert-lv/CVE-2020-0688)
|
||||
- [ravinacademy/CVE-2020-0688](https://github.com/ravinacademy/CVE-2020-0688)
|
||||
- [mahyarx/Exploit_CVE-2020-0688](https://github.com/mahyarx/Exploit_CVE-2020-0688)
|
||||
- [curtbraz/CVE-2020-0688](https://github.com/curtbraz/CVE-2020-0688)
|
||||
- [l33terman6000/CVE-2020-0688](https://github.com/l33terman6000/CVE-2020-0688)
|
||||
|
||||
### CVE-2020-0692
|
||||
|
||||
<code>
|
||||
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [githubassets/CVE-2020-0692](https://github.com/githubassets/CVE-2020-0692)
|
||||
|
||||
### CVE-2020-0728
|
||||
|
||||
|
@ -237,8 +245,16 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
|
||||
- [0xeb-bp/cve-2020-0796](https://github.com/0xeb-bp/cve-2020-0796)
|
||||
- [intelliroot-tech/cve-2020-0796-Scanner](https://github.com/intelliroot-tech/cve-2020-0796-Scanner)
|
||||
- [curtbraz/CVE-2020-0796](https://github.com/curtbraz/CVE-2020-0796)
|
||||
- [wurmx56/CVE-2020-0796](https://github.com/wurmx56/CVE-2020-0796)
|
||||
- [l33terman6000/CVE-2020-0796](https://github.com/l33terman6000/CVE-2020-0796)
|
||||
|
||||
### CVE-2020-0798
|
||||
|
||||
<code>
|
||||
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0779, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843.
|
||||
</code>
|
||||
|
||||
- [githubassets/CVE-2020-0798](https://github.com/githubassets/CVE-2020-0798)
|
||||
|
||||
### CVE-2020-0814
|
||||
|
||||
|
@ -254,7 +270,8 @@ An elevation of privilege vulnerability exists in Windows Installer because of t
|
|||
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0881.
|
||||
</code>
|
||||
|
||||
- [curtbraz/CVE-2020-0883](https://github.com/curtbraz/CVE-2020-0883)
|
||||
- [githubassets/CVE-2020-0883](https://github.com/githubassets/CVE-2020-0883)
|
||||
- [l33terman6000/CVE-2020-0883](https://github.com/l33terman6000/CVE-2020-0883)
|
||||
|
||||
### CVE-2020-0905
|
||||
|
||||
|
@ -262,7 +279,8 @@ A remote code execution vulnerability exists in the way that the Windows Graphic
|
|||
An remote code execution vulnerability exists in Microsoft Dynamics Business Central, aka 'Dynamics Business Central Remote Code Execution Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [curtbraz/CVE-2020-0905](https://github.com/curtbraz/CVE-2020-0905)
|
||||
- [githubassets/CVE-2020-0905](https://github.com/githubassets/CVE-2020-0905)
|
||||
- [l33terman6000/CVE-2020-0905](https://github.com/l33terman6000/CVE-2020-0905)
|
||||
|
||||
### CVE-2020-0976
|
||||
|
||||
|
@ -486,10 +504,11 @@ An inconsistent user interface issue was addressed with improved state managemen
|
|||
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
|
||||
</code>
|
||||
|
||||
- [curtbraz/CVE-2020-3952](https://github.com/curtbraz/CVE-2020-3952)
|
||||
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
|
||||
- [frustreated/CVE-2020-3952](https://github.com/frustreated/CVE-2020-3952)
|
||||
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
|
||||
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
|
||||
- [l33terman6000/CVE-2020-3952](https://github.com/l33terman6000/CVE-2020-3952)
|
||||
|
||||
### CVE-2020-4276
|
||||
|
||||
|
@ -13048,7 +13067,6 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
|
|||
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
|
||||
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
|
||||
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
|
||||
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
|
||||
|
||||
|
||||
## 2002
|
||||
|
|
Loading…
Add table
Reference in a new issue