mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-03-12 19:28:34 +01:00
Auto Update 2020/04/07 06:08:29
This commit is contained in:
parent
347def6700
commit
54ea1615c4
42 changed files with 284 additions and 231 deletions
|
|
@ -289,13 +289,13 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2020-03-05T02:43:34Z",
|
||||
"updated_at": "2020-04-06T16:12:16Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-22T23:03:30Z",
|
||||
"updated_at": "2020-04-01T13:30:43Z",
|
||||
"updated_at": "2020-04-06T15:09:49Z",
|
||||
"pushed_at": "2016-06-23T00:47:50Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-03T16:47:32Z",
|
||||
"updated_at": "2020-03-24T09:39:30Z",
|
||||
"updated_at": "2020-04-06T15:12:56Z",
|
||||
"pushed_at": "2019-03-10T02:18:00Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-04-05T06:27:43Z",
|
||||
"updated_at": "2020-04-06T15:07:48Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 442,
|
||||
"watchers": 443,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2020-03-22T07:01:24Z",
|
||||
"updated_at": "2020-04-06T19:52:49Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 146,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-04-01T00:05:01Z",
|
||||
"updated_at": "2020-04-06T19:55:25Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 536,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2019-10-11T19:04:26Z",
|
||||
"updated_at": "2020-04-06T19:50:34Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2020-03-01T00:18:53Z",
|
||||
"updated_at": "2020-04-06T17:44:19Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit the vulnerability to execute the calculator",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:16:32Z",
|
||||
"updated_at": "2019-12-15T23:35:38Z",
|
||||
"updated_at": "2020-04-06T19:53:00Z",
|
||||
"pushed_at": "2018-01-11T09:23:05Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -59,13 +59,13 @@
|
|||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2020-03-22T07:01:24Z",
|
||||
"updated_at": "2020-04-06T19:52:49Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 146,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -220,13 +220,13 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2020-02-26T02:49:11Z",
|
||||
"updated_at": "2020-04-06T18:37:53Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -427,13 +427,13 @@
|
|||
"description": "CVE-2018-10933 POC (LIBSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T21:17:52Z",
|
||||
"updated_at": "2019-07-12T14:31:54Z",
|
||||
"updated_at": "2020-04-06T19:25:11Z",
|
||||
"pushed_at": "2018-10-24T07:58:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T12:45:15Z",
|
||||
"updated_at": "2019-09-12T19:52:48Z",
|
||||
"updated_at": "2020-04-06T19:13:36Z",
|
||||
"pushed_at": "2018-08-25T14:20:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13382",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T11:13:44Z",
|
||||
"updated_at": "2020-03-09T03:58:35Z",
|
||||
"updated_at": "2020-04-06T18:19:53Z",
|
||||
"pushed_at": "2019-08-13T15:06:28Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -128,13 +128,13 @@
|
|||
"description": "OpenSSH 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T21:48:07Z",
|
||||
"updated_at": "2020-01-27T15:11:00Z",
|
||||
"updated_at": "2020-04-06T19:24:59Z",
|
||||
"pushed_at": "2018-10-27T01:07:49Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ERPScan Public POC for CVE-2018-2636",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T15:16:02Z",
|
||||
"updated_at": "2020-04-04T17:38:25Z",
|
||||
"updated_at": "2020-04-06T19:51:01Z",
|
||||
"pushed_at": "2018-02-01T15:36:19Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-2893-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-22T01:15:58Z",
|
||||
"updated_at": "2020-02-13T08:55:01Z",
|
||||
"updated_at": "2020-04-06T19:14:37Z",
|
||||
"pushed_at": "2018-10-27T01:42:20Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-04-01T00:05:01Z",
|
||||
"updated_at": "2020-04-06T19:55:25Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 536,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RTSPServer Code Execution Vulnerability CVE-2018-4013",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-24T15:49:53Z",
|
||||
"updated_at": "2019-07-12T15:07:09Z",
|
||||
"updated_at": "2020-04-06T19:24:12Z",
|
||||
"pushed_at": "2018-11-26T23:35:57Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit iOS 11.2.x by ZIMPERIUM and semi-completed by me. Sandbox escapes on CVE-2018-4087. ",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T18:04:31Z",
|
||||
"updated_at": "2018-09-19T18:32:58Z",
|
||||
"updated_at": "2020-04-06T19:47:42Z",
|
||||
"pushed_at": "2018-03-08T15:41:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2018-11-02T22:13:40Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
@ -174,13 +174,13 @@
|
|||
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-04T01:47:05Z",
|
||||
"updated_at": "2020-04-06T10:57:39Z",
|
||||
"updated_at": "2020-04-06T19:24:44Z",
|
||||
"pushed_at": "2018-11-04T02:25:08Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "MikroTik RouterOS Denial of Service Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T01:40:02Z",
|
||||
"updated_at": "2019-02-23T03:58:33Z",
|
||||
"updated_at": "2020-04-06T19:46:14Z",
|
||||
"pushed_at": "2018-02-11T06:51:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 389,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-31T16:38:48Z",
|
||||
"updated_at": "2020-04-01T13:33:58Z",
|
||||
"updated_at": "2020-04-06T19:50:52Z",
|
||||
"pushed_at": "2018-02-01T20:08:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-04-24T16:32:22Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "VMware NSX SD-WAN command injection vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-08T13:00:35Z",
|
||||
"updated_at": "2019-07-12T15:01:27Z",
|
||||
"updated_at": "2020-04-06T19:22:25Z",
|
||||
"pushed_at": "2019-02-08T13:05:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-04-06T11:02:45Z",
|
||||
"updated_at": "2020-04-06T18:15:42Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 414,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Drupal 0day Remote PHP Code Execution (Perl)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-14T09:02:54Z",
|
||||
"updated_at": "2020-02-17T23:18:39Z",
|
||||
"updated_at": "2020-04-06T19:37:49Z",
|
||||
"pushed_at": "2018-04-14T09:06:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -473,13 +473,13 @@
|
|||
"description": "CVE-2018-7600 POC (Drupal RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T21:47:59Z",
|
||||
"updated_at": "2019-07-12T14:31:54Z",
|
||||
"updated_at": "2020-04-06T19:25:17Z",
|
||||
"pushed_at": "2018-10-23T22:27:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-02T19:01:17Z",
|
||||
"updated_at": "2020-04-06T10:52:40Z",
|
||||
"updated_at": "2020-04-06T19:24:04Z",
|
||||
"pushed_at": "2018-12-03T21:13:00Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-22T21:50:32Z",
|
||||
"updated_at": "2020-02-21T17:21:50Z",
|
||||
"updated_at": "2020-04-06T19:18:19Z",
|
||||
"pushed_at": "2018-05-23T20:43:58Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2020-03-09T12:03:04Z",
|
||||
"updated_at": "2020-04-06T19:18:10Z",
|
||||
"pushed_at": "2018-05-30T03:33:14Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-0604",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-23T05:01:54Z",
|
||||
"updated_at": "2020-03-23T11:08:00Z",
|
||||
"updated_at": "2020-04-06T18:32:14Z",
|
||||
"pushed_at": "2019-03-22T05:45:44Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -1627,8 +1627,8 @@
|
|||
"pushed_at": "2020-03-20T10:50:06Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
},
|
||||
|
|
@ -2386,8 +2386,8 @@
|
|||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-04-03T17:53:25Z",
|
||||
"updated_at": "2020-04-06T19:56:10Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 657,
|
||||
"watchers_count": 657,
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 657,
|
||||
"watchers": 658,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-04-05T13:35:58Z",
|
||||
"updated_at": "2020-04-06T19:44:40Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Directory transversal to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T03:40:13Z",
|
||||
"updated_at": "2020-03-29T03:53:03Z",
|
||||
"updated_at": "2020-04-06T18:11:47Z",
|
||||
"pushed_at": "2019-10-15T03:53:55Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-10T18:28:11Z",
|
||||
"updated_at": "2020-01-23T08:20:55Z",
|
||||
"updated_at": "2020-04-06T18:10:38Z",
|
||||
"pushed_at": "2019-11-10T18:28:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit and Mass Pwn3r for CVE-2019-16920",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T17:54:03Z",
|
||||
"updated_at": "2020-02-22T18:11:07Z",
|
||||
"updated_at": "2020-04-06T18:08:39Z",
|
||||
"pushed_at": "2019-12-21T17:31:56Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T12:42:54Z",
|
||||
"updated_at": "2020-03-18T09:48:22Z",
|
||||
"updated_at": "2020-04-06T17:04:06Z",
|
||||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-03-04T15:17:18Z",
|
||||
"updated_at": "2020-04-06T18:00:45Z",
|
||||
"pushed_at": "2020-01-31T17:06:55Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 91,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-02T14:54:08Z",
|
||||
"updated_at": "2019-09-28T16:25:15Z",
|
||||
"updated_at": "2020-04-06T18:19:09Z",
|
||||
"pushed_at": "2019-05-02T15:15:51Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2020-04-04T11:05:40Z",
|
||||
"updated_at": "2020-04-06T20:01:50Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 573,
|
||||
"watchers_count": 573,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 573,
|
||||
"stargazers_count": 574,
|
||||
"watchers_count": 574,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 574,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2020-03-28T14:53:10Z",
|
||||
"updated_at": "2020-04-06T18:18:46Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-24T00:17:37Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
|
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-06T13:11:28Z",
|
||||
"updated_at": "2020-04-06T16:19:12Z",
|
||||
"pushed_at": "2020-04-03T13:31:54Z",
|
||||
"stargazers_count": 773,
|
||||
"watchers_count": 773,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 773,
|
||||
"stargazers_count": 774,
|
||||
"watchers_count": 774,
|
||||
"forks_count": 210,
|
||||
"forks": 210,
|
||||
"watchers": 774,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -1002,13 +1002,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-04-06T10:52:58Z",
|
||||
"updated_at": "2020-04-06T17:43:17Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
@ -1171,5 +1171,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253535658,
|
||||
"name": "CVE_2020_0796_CNA",
|
||||
"full_name": "Rvn0xsy\/CVE_2020_0796_CNA",
|
||||
"owner": {
|
||||
"login": "Rvn0xsy",
|
||||
"id": 19944759,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/19944759?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy\/CVE_2020_0796_CNA",
|
||||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-04-06T19:32:06Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253536195,
|
||||
"name": "CVE-2020-0796-scanner",
|
||||
"full_name": "sivak1rl\/CVE-2020-0796-scanner",
|
||||
"owner": {
|
||||
"login": "sivak1rl",
|
||||
"id": 8893063,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8893063?v=4",
|
||||
"html_url": "https:\/\/github.com\/sivak1rl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sivak1rl\/CVE-2020-0796-scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:18:11Z",
|
||||
"updated_at": "2020-04-06T15:18:11Z",
|
||||
"pushed_at": "2020-04-06T15:18:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -450,13 +450,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,尽力补全所有脚本文件的使用说明文档,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-06T14:55:19Z",
|
||||
"updated_at": "2020-04-06T17:10:44Z",
|
||||
"pushed_at": "2020-04-05T10:36:55Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-04-01T13:40:15Z",
|
||||
"updated_at": "2020-04-06T16:38:46Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
|||
|
|
@ -217,6 +217,8 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [wurmx64/CVE-2020-0796](https://github.com/wurmx64/CVE-2020-0796)
|
||||
- [eastmountyxz/CVE-2020-0796-SMB](https://github.com/eastmountyxz/CVE-2020-0796-SMB)
|
||||
- [LabDookhtegan/CVE-2020-0796-EXP](https://github.com/LabDookhtegan/CVE-2020-0796-EXP)
|
||||
- [Rvn0xsy/CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA)
|
||||
- [sivak1rl/CVE-2020-0796-scanner](https://github.com/sivak1rl/CVE-2020-0796-scanner)
|
||||
|
||||
### CVE-2020-0976
|
||||
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
|
||||
|
|
@ -2698,6 +2700,11 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
|
|||
- [jra89/CVE-2019-19658](https://github.com/jra89/CVE-2019-19658)
|
||||
|
||||
### CVE-2019-19699
|
||||
|
||||
<code>
|
||||
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.
|
||||
</code>
|
||||
|
||||
- [SpengeSec/CVE-2019-19699](https://github.com/SpengeSec/CVE-2019-19699)
|
||||
|
||||
### CVE-2019-19732
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue