mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/03/01 06:07:31
This commit is contained in:
parent
64b0a83bbc
commit
46aa6e9fe5
32 changed files with 203 additions and 185 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-01-17T22:01:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 132565257,
|
||||
"name": "metasploitable2",
|
||||
"full_name": "noondi\/metasploitable2",
|
||||
"owner": {
|
||||
"login": "noondi",
|
||||
"id": 33064962,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33064962?v=4",
|
||||
"html_url": "https:\/\/github.com\/noondi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/noondi\/metasploitable2",
|
||||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-08T06:37:50Z",
|
||||
"updated_at": "2019-07-26T08:58:34Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 143461594,
|
||||
"name": "CVE-2007-2447",
|
||||
|
@ -68,29 +45,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 225688290,
|
||||
"name": "exploit_smb_usermap_script",
|
||||
"full_name": "Unam3dd\/exploit_smb_usermap_script",
|
||||
"owner": {
|
||||
"login": "Unam3dd",
|
||||
"id": 34691959,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unam3dd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unam3dd\/exploit_smb_usermap_script",
|
||||
"description": "Python Script Exploit SMB Usermap Script CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-03T18:25:41Z",
|
||||
"updated_at": "2019-12-04T21:34:38Z",
|
||||
"pushed_at": "2019-12-03T18:36:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235003634,
|
||||
"name": "CVE-2007-2447",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-28T06:15:16Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-28T06:15:16Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/wetw0rk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
|
||||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2020-02-19T23:57:44Z",
|
||||
"pushed_at": "2020-02-19T23:57:42Z",
|
||||
"updated_at": "2020-02-29T20:59:18Z",
|
||||
"pushed_at": "2020-02-29T20:57:55Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
|
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/wetw0rk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
|
||||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2020-02-19T23:57:44Z",
|
||||
"pushed_at": "2020-02-19T23:57:42Z",
|
||||
"updated_at": "2020-02-29T20:59:18Z",
|
||||
"pushed_at": "2020-02-29T20:57:55Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-28T06:15:16Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2020-02-27T17:22:08Z",
|
||||
"updated_at": "2020-02-29T16:01:43Z",
|
||||
"pushed_at": "2020-01-14T12:35:09Z",
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 283,
|
||||
"forks": 283,
|
||||
"watchers": 316,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/wetw0rk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
|
||||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2020-02-19T23:57:44Z",
|
||||
"pushed_at": "2020-02-19T23:57:42Z",
|
||||
"updated_at": "2020-02-29T21:04:33Z",
|
||||
"pushed_at": "2020-02-29T21:04:31Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-28T06:15:16Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/wetw0rk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
|
||||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2020-02-19T23:57:44Z",
|
||||
"pushed_at": "2020-02-19T23:57:42Z",
|
||||
"updated_at": "2020-02-29T21:04:33Z",
|
||||
"pushed_at": "2020-02-29T21:04:31Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
|
|
|
@ -174,12 +174,12 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-02-21T08:49:18Z",
|
||||
"updated_at": "2020-02-29T20:52:30Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-22T19:14:05Z",
|
||||
"updated_at": "2020-02-29T00:25:16Z",
|
||||
"updated_at": "2020-02-29T19:33:18Z",
|
||||
"pushed_at": "2019-12-22T19:18:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,8 +128,8 @@
|
|||
"description": "Mass Exploit CVE-2019-16759",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T23:14:52Z",
|
||||
"updated_at": "2020-02-21T00:41:11Z",
|
||||
"pushed_at": "2020-02-21T00:41:09Z",
|
||||
"updated_at": "2020-02-29T21:05:46Z",
|
||||
"pushed_at": "2020-02-29T21:05:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-28T06:15:16Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2019-3396 confluence SSTI RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:15:47Z",
|
||||
"updated_at": "2020-02-28T11:11:56Z",
|
||||
"updated_at": "2020-02-29T16:32:15Z",
|
||||
"pushed_at": "2019-04-12T01:46:33Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Python script to exploit confluence path traversal vulnerability cve-2019-3398",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-20T08:07:49Z",
|
||||
"updated_at": "2019-12-04T09:49:36Z",
|
||||
"updated_at": "2020-02-29T17:02:55Z",
|
||||
"pushed_at": "2019-06-06T21:17:09Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -83,7 +83,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-03-23T02:52:31Z",
|
||||
"updated_at": "2020-02-20T03:15:14Z",
|
||||
"pushed_at": "2020-02-29T01:25:30Z",
|
||||
"pushed_at": "2020-02-29T16:09:13Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 16,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "A small python script that checks for CVE-2019-8446",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-29T04:29:02Z",
|
||||
"updated_at": "2020-02-29T04:30:08Z",
|
||||
"pushed_at": "2020-02-29T04:30:06Z",
|
||||
"updated_at": "2020-02-29T20:50:33Z",
|
||||
"pushed_at": "2020-02-29T20:50:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -33,11 +33,11 @@
|
|||
"html_url": "https:\/\/github.com\/charlesLoiseau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/charlesLoiseau\/CVE-2019-9193",
|
||||
"description": "honeypot for cve CVE-2019–9193 in rust",
|
||||
"description": "honeypot for cve CVE-2019–9193 in python",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T19:18:48Z",
|
||||
"updated_at": "2020-02-28T19:24:11Z",
|
||||
"pushed_at": "2020-02-28T19:24:09Z",
|
||||
"updated_at": "2020-02-29T19:11:40Z",
|
||||
"pushed_at": "2020-02-29T19:11:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
25
2019/CVE-2019-9465.json
Normal file
25
2019/CVE-2019-9465.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 241634998,
|
||||
"name": "CVE-2019-9465",
|
||||
"full_name": "alexbakker\/CVE-2019-9465",
|
||||
"owner": {
|
||||
"login": "alexbakker",
|
||||
"id": 2387841,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2387841?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexbakker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexbakker\/CVE-2019-9465",
|
||||
"description": "Demo Android application for CVE-2019-9465",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T13:57:11Z",
|
||||
"updated_at": "2020-02-29T19:08:14Z",
|
||||
"pushed_at": "2020-02-19T13:57:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-16T17:18:01Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "CVE-2020-0618 Honeypot",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:17:19Z",
|
||||
"updated_at": "2020-02-21T15:04:41Z",
|
||||
"pushed_at": "2020-02-21T15:04:39Z",
|
||||
"updated_at": "2020-02-29T18:46:45Z",
|
||||
"pushed_at": "2020-02-29T18:46:43Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2020-02-29T14:27:29Z",
|
||||
"updated_at": "2020-02-29T16:33:52Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 125,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0688 - Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T12:28:11Z",
|
||||
"updated_at": "2020-02-29T06:52:15Z",
|
||||
"updated_at": "2020-02-29T15:33:59Z",
|
||||
"pushed_at": "2020-02-27T03:50:07Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-02-29T14:28:30Z",
|
||||
"updated_at": "2020-02-29T19:05:26Z",
|
||||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 108,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2020-02-29T14:34:34Z",
|
||||
"updated_at": "2020-02-29T16:22:08Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 35,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T17:03:53Z",
|
||||
"updated_at": "2020-02-29T06:53:07Z",
|
||||
"updated_at": "2020-02-29T15:34:30Z",
|
||||
"pushed_at": "2020-02-28T17:07:15Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-02-29T10:13:21Z",
|
||||
"updated_at": "2020-02-29T18:49:05Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T17:00:02Z",
|
||||
"updated_at": "2020-02-29T10:13:11Z",
|
||||
"updated_at": "2020-02-29T18:49:09Z",
|
||||
"pushed_at": "2020-02-20T17:01:53Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T17:57:54Z",
|
||||
"updated_at": "2020-02-29T07:15:50Z",
|
||||
"updated_at": "2020-02-29T18:48:59Z",
|
||||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 31,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-1938漏洞复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T02:36:37Z",
|
||||
"updated_at": "2020-02-29T12:06:53Z",
|
||||
"updated_at": "2020-02-29T18:49:14Z",
|
||||
"pushed_at": "2020-02-21T02:49:57Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2020-02-24T08:18:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read\/execute file,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-02-29T12:03:09Z",
|
||||
"updated_at": "2020-02-29T18:14:07Z",
|
||||
"pushed_at": "2020-02-26T02:58:10Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-02-29T14:54:58Z",
|
||||
"updated_at": "2020-02-29T15:14:38Z",
|
||||
"pushed_at": "2020-02-28T09:34:19Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-8012.json
Normal file
25
2020/CVE-2020-8012.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 89426502,
|
||||
"name": "Exploit-Development",
|
||||
"full_name": "wetw0rk\/Exploit-Development",
|
||||
"owner": {
|
||||
"login": "wetw0rk",
|
||||
"id": 20763546,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/20763546?v=4",
|
||||
"html_url": "https:\/\/github.com\/wetw0rk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wetw0rk\/Exploit-Development",
|
||||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2020-02-29T21:04:33Z",
|
||||
"pushed_at": "2020-02-29T21:04:31Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-8840",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T14:32:24Z",
|
||||
"updated_at": "2020-02-29T14:27:23Z",
|
||||
"updated_at": "2020-02-29T15:48:50Z",
|
||||
"pushed_at": "2020-02-28T09:12:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T01:27:08Z",
|
||||
"updated_at": "2020-02-29T09:44:54Z",
|
||||
"updated_at": "2020-02-29T15:22:08Z",
|
||||
"pushed_at": "2020-02-28T02:22:03Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
18
README.md
18
README.md
|
@ -281,6 +281,14 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command
|
|||
|
||||
- [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980)
|
||||
|
||||
### CVE-2020-8012
|
||||
|
||||
<code>
|
||||
CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
|
||||
|
||||
### CVE-2020-8417
|
||||
|
||||
<code>
|
||||
|
@ -3193,6 +3201,14 @@ Nagios IM (component of Nagios XI) before 2.2.7 allows authenticated users to ex
|
|||
|
||||
- [polict/CVE-2019-9202](https://github.com/polict/CVE-2019-9202)
|
||||
|
||||
### CVE-2019-9465
|
||||
|
||||
<code>
|
||||
In the Titan M handling of cryptographic operations, there is a possible information disclosure due to an unusual root cause. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-133258003
|
||||
</code>
|
||||
|
||||
- [alexbakker/CVE-2019-9465](https://github.com/alexbakker/CVE-2019-9465)
|
||||
|
||||
### CVE-2019-9506
|
||||
|
||||
<code>
|
||||
|
@ -12188,10 +12204,8 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows
|
|||
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
|
||||
</code>
|
||||
|
||||
- [noondi/metasploitable2](https://github.com/noondi/metasploitable2)
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
|
||||
### CVE-2007-3830
|
||||
|
|
Loading…
Reference in a new issue