mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/07/01 12:08:07
This commit is contained in:
parent
825b8c98e8
commit
2c4a3d3a7c
23 changed files with 140 additions and 83 deletions
|
@ -13,8 +13,8 @@
|
|||
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T13:07:31Z",
|
||||
"updated_at": "2020-06-30T13:07:35Z",
|
||||
"pushed_at": "2020-06-30T13:07:33Z",
|
||||
"updated_at": "2020-06-30T22:21:48Z",
|
||||
"pushed_at": "2020-06-30T22:21:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -106,7 +106,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-12-19T07:45:21Z",
|
||||
"updated_at": "2019-12-19T08:09:43Z",
|
||||
"pushed_at": "2020-06-18T17:03:27Z",
|
||||
"pushed_at": "2020-06-30T21:22:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-31T08:51:07Z",
|
||||
"updated_at": "2020-05-10T07:22:19Z",
|
||||
"updated_at": "2020-06-30T23:07:01Z",
|
||||
"pushed_at": "2019-03-31T08:52:24Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-30T19:26:49Z",
|
||||
"updated_at": "2020-07-01T02:48:17Z",
|
||||
"pushed_at": "2020-06-30T05:28:32Z",
|
||||
"stargazers_count": 1067,
|
||||
"watchers_count": 1067,
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 265,
|
||||
"forks": 265,
|
||||
"watchers": 1067,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-20T18:47:25Z",
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 245,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 17,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 276237731,
|
||||
"name": "Bluefrag_CVE-2020-0022",
|
||||
"full_name": "k3vinlusec\/Bluefrag_CVE-2020-0022",
|
||||
"owner": {
|
||||
"login": "k3vinlusec",
|
||||
"id": 19988136,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19988136?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3vinlusec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3vinlusec\/Bluefrag_CVE-2020-0022",
|
||||
"description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-01T00:23:33Z",
|
||||
"updated_at": "2020-07-01T00:47:52Z",
|
||||
"pushed_at": "2020-07-01T00:47:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-24T13:10:39Z",
|
||||
"updated_at": "2020-06-30T09:40:47Z",
|
||||
"updated_at": "2020-07-01T02:56:48Z",
|
||||
"pushed_at": "2020-03-24T13:19:34Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-06-30T07:15:44Z",
|
||||
"updated_at": "2020-07-01T02:52:30Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 188,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-06-30T14:52:30Z",
|
||||
"updated_at": "2020-07-01T02:33:14Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 336,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-06-30T15:55:00Z",
|
||||
"updated_at": "2020-06-30T22:35:52Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 506,
|
||||
"watchers": 507,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2020-06-11T13:09:05Z",
|
||||
"updated_at": "2020-06-30T22:35:34Z",
|
||||
"pushed_at": "2020-03-16T17:25:51Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1186,13 +1186,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-06-30T13:25:27Z",
|
||||
"updated_at": "2020-07-01T02:11:33Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-30T19:26:49Z",
|
||||
"updated_at": "2020-07-01T02:48:17Z",
|
||||
"pushed_at": "2020-06-30T05:28:32Z",
|
||||
"stargazers_count": 1067,
|
||||
"watchers_count": 1067,
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 265,
|
||||
"forks": 265,
|
||||
"watchers": 1067,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-11519.json
Normal file
25
2020/CVE-2020-11519.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 276226715,
|
||||
"name": "winmagic_sd",
|
||||
"full_name": "patois\/winmagic_sd",
|
||||
"owner": {
|
||||
"login": "patois",
|
||||
"id": 2330989,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2330989?v=4",
|
||||
"html_url": "https:\/\/github.com\/patois"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/patois\/winmagic_sd",
|
||||
"description": "Technical Write-Up on and Poc Exploit for CVE-2020-11519 and CVE-2020-11520",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T23:01:33Z",
|
||||
"updated_at": "2020-06-30T23:05:04Z",
|
||||
"pushed_at": "2020-06-30T23:04:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-06-30T02:33:10Z",
|
||||
"updated_at": "2020-07-01T02:05:11Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 309,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 310,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-12828 PoC and Analysis. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T15:18:58Z",
|
||||
"updated_at": "2020-06-30T19:34:55Z",
|
||||
"updated_at": "2020-07-01T02:32:02Z",
|
||||
"pushed_at": "2020-06-30T16:03:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-06-27T11:23:56Z",
|
||||
"updated_at": "2020-07-01T02:36:43Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-29T17:21:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-03T18:49:35Z",
|
||||
"updated_at": "2020-05-23T17:01:55Z",
|
||||
"updated_at": "2020-07-01T00:52:12Z",
|
||||
"pushed_at": "2020-04-03T19:23:54Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-22T16:33:31Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/medium.com\/@anderson_pablo\/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T02:29:14Z",
|
||||
"updated_at": "2020-06-29T16:42:25Z",
|
||||
"updated_at": "2020-07-01T02:25:34Z",
|
||||
"pushed_at": "2020-03-12T02:25:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-06-15T02:49:52Z",
|
||||
"updated_at": "2020-07-01T02:56:09Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -9,6 +9,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
|
|||
|
||||
- [marcinguy/CVE-2020-0022](https://github.com/marcinguy/CVE-2020-0022)
|
||||
- [leommxj/cve-2020-0022](https://github.com/leommxj/cve-2020-0022)
|
||||
- [k3vinlusec/Bluefrag_CVE-2020-0022](https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022)
|
||||
|
||||
### CVE-2020-0041
|
||||
|
||||
|
@ -531,6 +532,14 @@ An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local
|
|||
- [joshfinley/CVE-2020-11492](https://github.com/joshfinley/CVE-2020-11492)
|
||||
- [CrackerCat/CVE-2020-11492](https://github.com/CrackerCat/CVE-2020-11492)
|
||||
|
||||
### CVE-2020-11519
|
||||
|
||||
<code>
|
||||
The SDDisk2k.sys driver of WinMagic SecureDoc v8.5 and earlier allows local users to read or write to physical disc sectors via a \\.\SecureDocDevice handle. Exploiting this vulnerability results in privileged code execution.
|
||||
</code>
|
||||
|
||||
- [patois/winmagic_sd](https://github.com/patois/winmagic_sd)
|
||||
|
||||
### CVE-2020-11539
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue