mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/01/25 12:07:13
This commit is contained in:
parent
f945405e35
commit
38e989a7a2
9 changed files with 59 additions and 59 deletions
|
@ -13,8 +13,8 @@
|
|||
"description": "Python3 script to scan for Linksys smart wifi devices that are vulnerable to CVE-2014-8244",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:14:49Z",
|
||||
"updated_at": "2020-01-24T20:27:21Z",
|
||||
"pushed_at": "2020-01-24T20:27:33Z",
|
||||
"updated_at": "2020-01-24T22:56:00Z",
|
||||
"pushed_at": "2020-01-24T22:55:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T02:21:28Z",
|
||||
"updated_at": "2020-01-24T19:02:13Z",
|
||||
"updated_at": "2020-01-25T01:32:25Z",
|
||||
"pushed_at": "2019-05-09T07:07:25Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1310,29 +1310,6 @@
|
|||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188265184,
|
||||
"name": "CVE-2019-0708-PoC-Exploit",
|
||||
"full_name": "curtbraz\/CVE-2019-0708-PoC-Exploit",
|
||||
"owner": {
|
||||
"login": "curtbraz",
|
||||
"id": 17833760,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
|
||||
"html_url": "https:\/\/github.com\/curtbraz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2019-0708-PoC-Exploit",
|
||||
"description": "CVE-2019-0708 PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T15:55:28Z",
|
||||
"updated_at": "2019-11-21T12:41:03Z",
|
||||
"pushed_at": "2019-05-23T15:56:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188274849,
|
||||
"name": "CVE-2019-0708-POC",
|
||||
|
@ -1356,6 +1333,29 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188287755,
|
||||
"name": "CVE-2019-0708-PoC-Exploit",
|
||||
"full_name": "freeide\/CVE-2019-0708-PoC-Exploit",
|
||||
"owner": {
|
||||
"login": "freeide",
|
||||
"id": 33774184,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/33774184?v=4",
|
||||
"html_url": "https:\/\/github.com\/freeide"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/freeide\/CVE-2019-0708-PoC-Exploit",
|
||||
"description": "CVE-2019-0708 PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T18:37:27Z",
|
||||
"updated_at": "2020-01-25T02:16:54Z",
|
||||
"pushed_at": "2019-05-23T15:56:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188316989,
|
||||
"name": "rdpscan",
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T10:04:30Z",
|
||||
"updated_at": "2020-01-22T19:43:22Z",
|
||||
"updated_at": "2020-01-24T23:42:57Z",
|
||||
"pushed_at": "2019-10-16T12:20:53Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -749,13 +749,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T23:13:00Z",
|
||||
"updated_at": "2020-01-24T21:01:18Z",
|
||||
"updated_at": "2020-01-24T21:54:53Z",
|
||||
"pushed_at": "2020-01-24T20:25:31Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-25T07:19:58Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-01-24T21:00:26Z",
|
||||
"updated_at": "2020-01-25T02:04:55Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 64,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T03:52:49Z",
|
||||
"updated_at": "2020-01-24T18:56:09Z",
|
||||
"updated_at": "2020-01-25T01:42:48Z",
|
||||
"pushed_at": "2020-01-24T16:05:09Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:47:45Z",
|
||||
"updated_at": "2020-01-24T20:57:00Z",
|
||||
"pushed_at": "2020-01-24T20:18:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2020-01-25T02:21:44Z",
|
||||
"pushed_at": "2020-01-25T02:21:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-23T12:54:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -4252,8 +4252,8 @@
|
|||
- [SugiB3o/Check-vuln-CVE-2019-0708](https://github.com/SugiB3o/Check-vuln-CVE-2019-0708)
|
||||
- [gobysec/CVE-2019-0708](https://github.com/gobysec/CVE-2019-0708)
|
||||
- [adalenv/CVE-2019-0708-Tool](https://github.com/adalenv/CVE-2019-0708-Tool)
|
||||
- [curtbraz/CVE-2019-0708-PoC-Exploit](https://github.com/curtbraz/CVE-2019-0708-PoC-Exploit)
|
||||
- [smallFunction/CVE-2019-0708-POC](https://github.com/smallFunction/CVE-2019-0708-POC)
|
||||
- [freeide/CVE-2019-0708-PoC-Exploit](https://github.com/freeide/CVE-2019-0708-PoC-Exploit)
|
||||
- [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan)
|
||||
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
|
||||
- [krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
|
|
Loading…
Reference in a new issue