mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/01/29 12:07:28
This commit is contained in:
parent
3aa8657be5
commit
32b2b8e8b3
17 changed files with 160 additions and 84 deletions
|
@ -128,13 +128,13 @@
|
|||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T10:10:43Z",
|
||||
"updated_at": "2020-01-26T23:00:37Z",
|
||||
"updated_at": "2020-01-29T00:51:13Z",
|
||||
"pushed_at": "2015-07-02T14:47:31Z",
|
||||
"stargazers_count": 568,
|
||||
"watchers_count": 568,
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"forks_count": 228,
|
||||
"forks": 228,
|
||||
"watchers": 568,
|
||||
"watchers": 569,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-26T13:35:10Z",
|
||||
"updated_at": "2020-01-28T22:43:10Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-26T13:35:10Z",
|
||||
"updated_at": "2020-01-28T22:43:10Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-26T13:35:10Z",
|
||||
"updated_at": "2020-01-28T22:43:10Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2020-01-08T08:13:46Z",
|
||||
"updated_at": "2020-01-28T22:17:47Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 379,
|
||||
"watchers": 380,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1163,13 +1163,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-01-24T04:39:06Z",
|
||||
"updated_at": "2020-01-29T00:36:01Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1078,
|
||||
"watchers_count": 1078,
|
||||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"forks_count": 360,
|
||||
"forks": 360,
|
||||
"watchers": 1078,
|
||||
"watchers": 1079,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1374,8 +1374,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"forks_count": 158,
|
||||
"forks": 158,
|
||||
"forks_count": 159,
|
||||
"forks": 159,
|
||||
"watchers": 690,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1466,8 +1466,8 @@
|
|||
"pushed_at": "2019-05-28T02:46:19Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-26T13:35:10Z",
|
||||
"updated_at": "2020-01-28T22:43:10Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-27T12:27:53Z",
|
||||
"updated_at": "2020-01-28T15:53:34Z",
|
||||
"updated_at": "2020-01-28T22:14:37Z",
|
||||
"pushed_at": "2020-01-27T12:32:04Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T08:23:46Z",
|
||||
"updated_at": "2020-01-28T12:39:14Z",
|
||||
"updated_at": "2020-01-29T01:59:42Z",
|
||||
"pushed_at": "2020-01-27T05:46:40Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-01-28T03:14:08Z",
|
||||
"updated_at": "2020-01-28T21:56:51Z",
|
||||
"pushed_at": "2020-01-22T14:17:33Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -427,8 +427,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T21:54:08Z",
|
||||
"updated_at": "2020-01-22T07:44:44Z",
|
||||
"pushed_at": "2020-01-22T07:44:42Z",
|
||||
"updated_at": "2020-01-28T22:56:43Z",
|
||||
"pushed_at": "2020-01-28T22:56:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-01-28T02:56:42Z",
|
||||
"updated_at": "2020-01-29T02:30:54Z",
|
||||
"pushed_at": "2020-01-25T19:18:24Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,13 +864,13 @@
|
|||
"description": "Python CVE-2019-19781 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T12:09:51Z",
|
||||
"updated_at": "2020-01-28T15:30:22Z",
|
||||
"updated_at": "2020-01-28T21:23:04Z",
|
||||
"pushed_at": "2020-01-28T15:30:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "Proof of Concept for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T23:44:37Z",
|
||||
"updated_at": "2020-01-28T02:06:21Z",
|
||||
"updated_at": "2020-01-29T01:14:11Z",
|
||||
"pushed_at": "2020-01-17T16:32:39Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -481,5 +481,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 236845131,
|
||||
"name": "Curveball",
|
||||
"full_name": "ioncodes\/Curveball",
|
||||
"owner": {
|
||||
"login": "ioncodes",
|
||||
"id": 18533297,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18533297?v=4",
|
||||
"html_url": "https:\/\/github.com\/ioncodes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ioncodes\/Curveball",
|
||||
"description": "PoC for CVE-2020-0601 - CryptoAPI exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T21:24:54Z",
|
||||
"updated_at": "2020-01-29T02:32:47Z",
|
||||
"pushed_at": "2020-01-28T22:06:57Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 236884560,
|
||||
"name": "gringotts",
|
||||
"full_name": "amlweems\/gringotts",
|
||||
"owner": {
|
||||
"login": "amlweems",
|
||||
"id": 117625,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/117625?v=4",
|
||||
"html_url": "https:\/\/github.com\/amlweems"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amlweems\/gringotts",
|
||||
"description": "proof of concept for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-29T01:59:43Z",
|
||||
"updated_at": "2020-01-29T02:12:44Z",
|
||||
"pushed_at": "2020-01-29T02:12:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-01-28T19:32:47Z",
|
||||
"updated_at": "2020-01-28T23:25:36Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 136,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T03:52:49Z",
|
||||
"updated_at": "2020-01-28T07:22:57Z",
|
||||
"updated_at": "2020-01-28T23:01:43Z",
|
||||
"pushed_at": "2020-01-26T21:04:27Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:47:45Z",
|
||||
"updated_at": "2020-01-28T13:48:36Z",
|
||||
"updated_at": "2020-01-28T22:35:15Z",
|
||||
"pushed_at": "2020-01-26T12:58:05Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 41,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T07:08:06Z",
|
||||
"updated_at": "2020-01-28T16:37:08Z",
|
||||
"updated_at": "2020-01-29T02:30:32Z",
|
||||
"pushed_at": "2020-01-18T07:14:34Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-7980.json
Normal file
25
2020/CVE-2020-7980.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 236865005,
|
||||
"name": "Satellian-CVE-2020-7980",
|
||||
"full_name": "Xh4H\/Satellian-CVE-2020-7980",
|
||||
"owner": {
|
||||
"login": "Xh4H",
|
||||
"id": 20613820,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20613820?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xh4H"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xh4H\/Satellian-CVE-2020-7980",
|
||||
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T23:27:20Z",
|
||||
"updated_at": "2020-01-29T00:59:32Z",
|
||||
"pushed_at": "2020-01-28T23:33:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -5497,6 +5497,8 @@
|
|||
- [cosmicifint/CVE-2020-0601](https://github.com/cosmicifint/CVE-2020-0601)
|
||||
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
|
||||
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
|
||||
- [ioncodes/Curveball](https://github.com/ioncodes/Curveball)
|
||||
- [amlweems/gringotts](https://github.com/amlweems/gringotts)
|
||||
|
||||
### CVE-2020-0609
|
||||
- [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609)
|
||||
|
@ -5533,4 +5535,7 @@
|
|||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
### CVE-2020-7980
|
||||
- [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980)
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue