mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2021/02/24 00:09:11
This commit is contained in:
parent
3bae5955cd
commit
2e37e1ad27
22 changed files with 117 additions and 108 deletions
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2018-13379",
|
"description": "CVE-2018-13379",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-08-11T09:44:37Z",
|
"created_at": "2019-08-11T09:44:37Z",
|
||||||
"updated_at": "2021-02-15T18:45:54Z",
|
"updated_at": "2021-02-23T11:19:14Z",
|
||||||
"pushed_at": "2019-08-14T08:40:25Z",
|
"pushed_at": "2019-08-14T08:40:25Z",
|
||||||
"stargazers_count": 219,
|
"stargazers_count": 220,
|
||||||
"watchers_count": 219,
|
"watchers_count": 220,
|
||||||
"forks_count": 80,
|
"forks_count": 80,
|
||||||
"forks": 80,
|
"forks": 80,
|
||||||
"watchers": 219,
|
"watchers": 220,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Tool for CVE-2018-16323",
|
"description": "Tool for CVE-2018-16323",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-11-18T15:30:46Z",
|
"created_at": "2018-11-18T15:30:46Z",
|
||||||
"updated_at": "2020-02-12T14:15:20Z",
|
"updated_at": "2021-02-23T11:06:19Z",
|
||||||
"pushed_at": "2019-01-17T21:01:56Z",
|
"pushed_at": "2019-01-17T21:01:56Z",
|
||||||
"stargazers_count": 76,
|
"stargazers_count": 77,
|
||||||
"watchers_count": 76,
|
"watchers_count": 77,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 76,
|
"watchers": 77,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -450,13 +450,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -473,8 +473,8 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-10-18T14:01:59Z",
|
"created_at": "2020-10-18T14:01:59Z",
|
||||||
"updated_at": "2021-02-21T22:54:13Z",
|
"updated_at": "2021-02-23T10:16:09Z",
|
||||||
"pushed_at": "2021-02-21T22:54:11Z",
|
"pushed_at": "2021-02-23T10:16:07Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build",
|
"description": "CVE-2018-6574 POC : golang 'go get' remote command execution during source code build",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-04-24T03:44:20Z",
|
"created_at": "2018-04-24T03:44:20Z",
|
||||||
"updated_at": "2020-11-01T09:29:29Z",
|
"updated_at": "2021-02-23T14:56:16Z",
|
||||||
"pushed_at": "2018-04-24T16:32:22Z",
|
"pushed_at": "2018-04-24T16:32:22Z",
|
||||||
"stargazers_count": 22,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 22,
|
"watchers_count": 21,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 22,
|
"watchers": 21,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -82,13 +82,13 @@
|
||||||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-06-21T09:22:43Z",
|
"created_at": "2019-06-21T09:22:43Z",
|
||||||
"updated_at": "2021-02-18T06:16:40Z",
|
"updated_at": "2021-02-23T09:25:18Z",
|
||||||
"pushed_at": "2020-04-26T10:49:25Z",
|
"pushed_at": "2020-04-26T10:49:25Z",
|
||||||
"stargazers_count": 719,
|
"stargazers_count": 720,
|
||||||
"watchers_count": 719,
|
"watchers_count": 720,
|
||||||
"forks_count": 150,
|
"forks_count": 150,
|
||||||
"forks": 150,
|
"forks": 150,
|
||||||
"watchers": 719,
|
"watchers": 720,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -151,13 +151,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
25
2020/CVE-2020-0082.json
Normal file
25
2020/CVE-2020-0082.json
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 341573053,
|
||||||
|
"name": "CVE-2020-0082-ExternalVibration",
|
||||||
|
"full_name": "0x742\/CVE-2020-0082-ExternalVibration",
|
||||||
|
"owner": {
|
||||||
|
"login": "0x742",
|
||||||
|
"id": 66528191,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66528191?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/0x742"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/0x742\/CVE-2020-0082-ExternalVibration",
|
||||||
|
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2021-02-23T14:00:55Z",
|
||||||
|
"updated_at": "2021-02-23T14:33:49Z",
|
||||||
|
"pushed_at": "2021-02-23T14:03:00Z",
|
||||||
|
"stargazers_count": 3,
|
||||||
|
"watchers_count": 3,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 3,
|
||||||
|
"score": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-09-11T07:38:22Z",
|
"pushed_at": "2020-09-11T07:38:22Z",
|
||||||
"stargazers_count": 503,
|
"stargazers_count": 503,
|
||||||
"watchers_count": 503,
|
"watchers_count": 503,
|
||||||
"forks_count": 122,
|
"forks_count": 123,
|
||||||
"forks": 122,
|
"forks": 123,
|
||||||
"watchers": 503,
|
"watchers": 503,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Test tool for CVE-2020-1472",
|
"description": "Test tool for CVE-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-08T08:58:37Z",
|
"created_at": "2020-09-08T08:58:37Z",
|
||||||
"updated_at": "2021-02-23T06:36:46Z",
|
"updated_at": "2021-02-23T10:26:17Z",
|
||||||
"pushed_at": "2020-10-21T12:10:28Z",
|
"pushed_at": "2020-10-21T12:10:28Z",
|
||||||
"stargazers_count": 1245,
|
"stargazers_count": 1246,
|
||||||
"watchers_count": 1245,
|
"watchers_count": 1246,
|
||||||
"forks_count": 289,
|
"forks_count": 289,
|
||||||
"forks": 289,
|
"forks": 289,
|
||||||
"watchers": 1245,
|
"watchers": 1246,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -128,13 +128,13 @@
|
||||||
"description": "Exploit for zerologon cve-2020-1472",
|
"description": "Exploit for zerologon cve-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T19:19:07Z",
|
"created_at": "2020-09-14T19:19:07Z",
|
||||||
"updated_at": "2021-02-23T04:25:11Z",
|
"updated_at": "2021-02-23T13:31:12Z",
|
||||||
"pushed_at": "2020-10-15T18:31:15Z",
|
"pushed_at": "2020-10-15T18:31:15Z",
|
||||||
"stargazers_count": 286,
|
"stargazers_count": 287,
|
||||||
"watchers_count": 286,
|
"watchers_count": 287,
|
||||||
"forks_count": 94,
|
"forks_count": 94,
|
||||||
"forks": 94,
|
"forks": 94,
|
||||||
"watchers": 286,
|
"watchers": 287,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -91,29 +91,6 @@
|
||||||
"watchers": 208,
|
"watchers": 208,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 242038197,
|
|
||||||
"name": "CVE-2020-1938",
|
|
||||||
"full_name": "laolisafe\/CVE-2020-1938",
|
|
||||||
"owner": {
|
|
||||||
"login": "laolisafe",
|
|
||||||
"id": 45027935,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45027935?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/laolisafe"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/laolisafe\/CVE-2020-1938",
|
|
||||||
"description": "CVE-2020-1938漏洞复现",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-02-21T02:36:37Z",
|
|
||||||
"updated_at": "2020-10-18T13:38:55Z",
|
|
||||||
"pushed_at": "2020-02-21T02:49:57Z",
|
|
||||||
"stargazers_count": 35,
|
|
||||||
"watchers_count": 35,
|
|
||||||
"forks_count": 10,
|
|
||||||
"forks": 10,
|
|
||||||
"watchers": 35,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 242054816,
|
"id": 242054816,
|
||||||
"name": "CVE-2020-1938",
|
"name": "CVE-2020-1938",
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-10-12T09:57:28Z",
|
"pushed_at": "2020-10-12T09:57:28Z",
|
||||||
"stargazers_count": 30,
|
"stargazers_count": 30,
|
||||||
"watchers_count": 30,
|
"watchers_count": 30,
|
||||||
"forks_count": 11,
|
"forks_count": 12,
|
||||||
"forks": 11,
|
"forks": 12,
|
||||||
"watchers": 30,
|
"watchers": 30,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2021-02-23T07:47:34Z",
|
"updated_at": "2021-02-23T10:06:38Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 922,
|
"stargazers_count": 923,
|
||||||
"watchers_count": 922,
|
"watchers_count": 923,
|
||||||
"forks_count": 217,
|
"forks_count": 217,
|
||||||
"forks": 217,
|
"forks": 217,
|
||||||
"watchers": 922,
|
"watchers": 923,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -25,14 +25,14 @@
|
||||||
{
|
{
|
||||||
"id": 256080140,
|
"id": 256080140,
|
||||||
"name": "CVE-2020-3952",
|
"name": "CVE-2020-3952",
|
||||||
"full_name": "frustreated\/CVE-2020-3952",
|
"full_name": "avboy1337\/CVE-2020-3952",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "frustreated",
|
"login": "avboy1337",
|
||||||
"id": 5463104,
|
"id": 5463104,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
|
||||||
"html_url": "https:\/\/github.com\/frustreated"
|
"html_url": "https:\/\/github.com\/avboy1337"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952",
|
"html_url": "https:\/\/github.com\/avboy1337\/CVE-2020-3952",
|
||||||
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-16T01:39:33Z",
|
"created_at": "2020-04-16T01:39:33Z",
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-09-29T17:20:12Z",
|
"pushed_at": "2020-09-29T17:20:12Z",
|
||||||
"stargazers_count": 156,
|
"stargazers_count": 156,
|
||||||
"watchers_count": 156,
|
"watchers_count": 156,
|
||||||
"forks_count": 51,
|
"forks_count": 52,
|
||||||
"forks": 51,
|
"forks": 52,
|
||||||
"watchers": 156,
|
"watchers": 156,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -82,13 +82,13 @@
|
||||||
"description": "Scanning for CVE-2020-8193 - Auth Bypass check",
|
"description": "Scanning for CVE-2020-8193 - Auth Bypass check",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-13T10:36:43Z",
|
"created_at": "2020-07-13T10:36:43Z",
|
||||||
"updated_at": "2020-11-24T17:20:22Z",
|
"updated_at": "2021-02-23T14:47:52Z",
|
||||||
"pushed_at": "2020-07-13T11:01:47Z",
|
"pushed_at": "2020-07-13T11:01:47Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 4,
|
"watchers_count": 5,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 4,
|
"watchers": 5,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-02-16T16:55:46Z",
|
"created_at": "2021-02-16T16:55:46Z",
|
||||||
"updated_at": "2021-02-23T04:48:46Z",
|
"updated_at": "2021-02-23T11:49:39Z",
|
||||||
"pushed_at": "2021-02-16T16:59:09Z",
|
"pushed_at": "2021-02-16T16:59:09Z",
|
||||||
"stargazers_count": 14,
|
"stargazers_count": 15,
|
||||||
"watchers_count": 14,
|
"watchers_count": 15,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 14,
|
"watchers": 15,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exploit for CVE-2021-3129",
|
"description": "Exploit for CVE-2021-3129",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-13T12:52:20Z",
|
"created_at": "2021-01-13T12:52:20Z",
|
||||||
"updated_at": "2021-02-23T09:07:40Z",
|
"updated_at": "2021-02-23T10:28:45Z",
|
||||||
"pushed_at": "2021-01-29T13:59:07Z",
|
"pushed_at": "2021-01-29T13:59:07Z",
|
||||||
"stargazers_count": 59,
|
"stargazers_count": 62,
|
||||||
"watchers_count": 59,
|
"watchers_count": 62,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 59,
|
"watchers": 62,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -335,13 +335,13 @@
|
||||||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-30T03:22:04Z",
|
"created_at": "2021-01-30T03:22:04Z",
|
||||||
"updated_at": "2021-02-22T21:10:21Z",
|
"updated_at": "2021-02-23T14:15:35Z",
|
||||||
"pushed_at": "2021-02-08T03:42:50Z",
|
"pushed_at": "2021-02-08T03:42:50Z",
|
||||||
"stargazers_count": 350,
|
"stargazers_count": 353,
|
||||||
"watchers_count": 350,
|
"watchers_count": 353,
|
||||||
"forks_count": 92,
|
"forks_count": 93,
|
||||||
"forks": 92,
|
"forks": 93,
|
||||||
"watchers": 350,
|
"watchers": 353,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -381,13 +381,13 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-30T20:39:58Z",
|
"created_at": "2021-01-30T20:39:58Z",
|
||||||
"updated_at": "2021-02-23T07:05:43Z",
|
"updated_at": "2021-02-23T13:57:43Z",
|
||||||
"pushed_at": "2021-02-02T17:07:09Z",
|
"pushed_at": "2021-02-02T17:07:09Z",
|
||||||
"stargazers_count": 606,
|
"stargazers_count": 608,
|
||||||
"watchers_count": 606,
|
"watchers_count": 608,
|
||||||
"forks_count": 171,
|
"forks_count": 171,
|
||||||
"forks": 171,
|
"forks": 171,
|
||||||
"watchers": 606,
|
"watchers": 608,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -634,7 +634,7 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-02-03T11:27:52Z",
|
"created_at": "2021-02-03T11:27:52Z",
|
||||||
"updated_at": "2021-02-04T06:16:27Z",
|
"updated_at": "2021-02-23T13:57:30Z",
|
||||||
"pushed_at": "2021-02-04T06:12:23Z",
|
"pushed_at": "2021-02-04T06:12:23Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
|
11
README.md
11
README.md
|
@ -316,6 +316,14 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible
|
||||||
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
|
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
|
||||||
- [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc)
|
- [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc)
|
||||||
|
|
||||||
|
### CVE-2020-0082 (2020-04-17)
|
||||||
|
|
||||||
|
<code>
|
||||||
|
In ExternalVibration of ExternalVibration.java, there is a possible activation of an arbitrary intent due to unsafe deserialization. This could lead to local escalation of privilege to system_server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140417434
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [0x742/CVE-2020-0082-ExternalVibration](https://github.com/0x742/CVE-2020-0082-ExternalVibration)
|
||||||
|
|
||||||
### CVE-2020-0096 (2020-05-14)
|
### CVE-2020-0096 (2020-05-14)
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -847,7 +855,6 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
||||||
- [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938)
|
- [xindongzhuaizhuai/CVE-2020-1938](https://github.com/xindongzhuaizhuai/CVE-2020-1938)
|
||||||
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
|
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
|
||||||
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
|
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
|
||||||
- [laolisafe/CVE-2020-1938](https://github.com/laolisafe/CVE-2020-1938)
|
|
||||||
- [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938)
|
- [DaemonShao/CVE-2020-1938](https://github.com/DaemonShao/CVE-2020-1938)
|
||||||
- [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read)
|
- [sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read](https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read)
|
||||||
- [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938)
|
- [fairyming/CVE-2020-1938](https://github.com/fairyming/CVE-2020-1938)
|
||||||
|
@ -1056,7 +1063,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
|
- [commandermoon/CVE-2020-3952](https://github.com/commandermoon/CVE-2020-3952)
|
||||||
- [frustreated/CVE-2020-3952](https://github.com/frustreated/CVE-2020-3952)
|
- [avboy1337/CVE-2020-3952](https://github.com/avboy1337/CVE-2020-3952)
|
||||||
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
|
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952)
|
||||||
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
|
- [gelim/CVE-2020-3952](https://github.com/gelim/CVE-2020-3952)
|
||||||
- [Fa1c0n35/vmware_vcenter_cve_2020_3952](https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952)
|
- [Fa1c0n35/vmware_vcenter_cve_2020_3952](https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952)
|
||||||
|
|
Loading…
Reference in a new issue