mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/08/26 12:09:10
This commit is contained in:
parent
f4c9fe5df0
commit
626ca30beb
18 changed files with 210 additions and 53 deletions
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2016-01-22T00:42:35Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "POC Code to exploite CVE-2014-3120",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-07T20:28:34Z",
|
||||
"updated_at": "2020-05-07T17:40:05Z",
|
||||
"updated_at": "2020-08-26T00:54:13Z",
|
||||
"pushed_at": "2014-07-07T20:35:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2020-08-24T11:58:00Z",
|
||||
"updated_at": "2020-08-25T22:14:35Z",
|
||||
"pushed_at": "2017-11-27T16:28:14Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2018-10-27T01:07:49Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-0230 & s2-059 poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-20T08:21:54Z",
|
||||
"updated_at": "2020-08-25T09:44:49Z",
|
||||
"updated_at": "2020-08-26T02:54:57Z",
|
||||
"pushed_at": "2020-08-21T12:41:14Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-25T07:48:55Z",
|
||||
"updated_at": "2020-08-26T02:57:47Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1534,
|
||||
"watchers_count": 1534,
|
||||
"stargazers_count": 1536,
|
||||
"watchers_count": 1536,
|
||||
"forks_count": 398,
|
||||
"forks": 398,
|
||||
"watchers": 1534,
|
||||
"watchers": 1536,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 233959211,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "nissan-sudo\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "nissan-sudo",
|
||||
"id": 58976920,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58976920?v=4",
|
||||
"html_url": "https:\/\/github.com\/nissan-sudo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
|
||||
"description": "Remote Code Execution Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T23:53:18Z",
|
||||
"updated_at": "2020-01-27T17:28:37Z",
|
||||
"pushed_at": "2020-01-14T23:56:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 233960159,
|
||||
"name": "cve-2020-0601",
|
||||
|
@ -22,6 +45,29 @@
|
|||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234134766,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "SherlockSec\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "SherlockSec",
|
||||
"id": 37545173,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
|
||||
"html_url": "https:\/\/github.com\/SherlockSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
|
||||
"description": "A Windows Crypto Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T17:26:58Z",
|
||||
"updated_at": "2020-01-16T20:56:07Z",
|
||||
"pushed_at": "2020-01-15T17:28:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234146234,
|
||||
"name": "CVE-2020-0601",
|
||||
|
@ -160,6 +206,29 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234378948,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "apmunch\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "apmunch",
|
||||
"id": 7328483,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7328483?v=4",
|
||||
"html_url": "https:\/\/github.com\/apmunch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/apmunch\/CVE-2020-0601",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T17:54:36Z",
|
||||
"updated_at": "2020-01-16T18:04:01Z",
|
||||
"pushed_at": "2020-01-16T18:03:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234433419,
|
||||
"name": "badecparams",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-08-25T17:32:08Z",
|
||||
"updated_at": "2020-08-25T21:16:00Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,7 +197,7 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-08-11T19:48:30Z",
|
||||
"updated_at": "2020-08-26T01:27:02Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-08-22T21:37:34Z",
|
||||
"updated_at": "2020-08-25T22:14:03Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 199,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-25T05:25:45Z",
|
||||
"updated_at": "2020-08-25T16:15:09Z",
|
||||
"updated_at": "2020-08-26T02:25:53Z",
|
||||
"pushed_at": "2020-08-25T05:46:30Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24597.json
Normal file
25
2020/CVE-2020-24597.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 290375222,
|
||||
"name": "CVE-2020-24597",
|
||||
"full_name": "HoangKien1020\/CVE-2020-24597",
|
||||
"owner": {
|
||||
"login": "HoangKien1020",
|
||||
"id": 24661746,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24661746?v=4",
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2020-24597",
|
||||
"description": "Directory traversal in com_media to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-26T02:31:21Z",
|
||||
"updated_at": "2020-08-26T03:07:17Z",
|
||||
"pushed_at": "2020-08-26T03:07:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -114,6 +114,29 @@
|
|||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253468631,
|
||||
"name": "CVE-2020-2551",
|
||||
"full_name": "cnsimo\/CVE-2020-2551",
|
||||
"owner": {
|
||||
"login": "cnsimo",
|
||||
"id": 22788893,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22788893?v=4",
|
||||
"html_url": "https:\/\/github.com\/cnsimo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cnsimo\/CVE-2020-2551",
|
||||
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T10:47:35Z",
|
||||
"updated_at": "2020-08-26T02:34:02Z",
|
||||
"pushed_at": "2020-04-06T10:59:36Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 264347023,
|
||||
"name": "weblogicPoc",
|
||||
|
|
25
2020/CVE-2020-5509.json
Normal file
25
2020/CVE-2020-5509.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 231982886,
|
||||
"name": "CVE-2020-5509",
|
||||
"full_name": "FULLSHADE\/CVE-2020-5509",
|
||||
"owner": {
|
||||
"login": "FULLSHADE",
|
||||
"id": 54753063,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54753063?v=4",
|
||||
"html_url": "https:\/\/github.com\/FULLSHADE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FULLSHADE\/CVE-2020-5509",
|
||||
"description": "Car Rental Project v.1.0 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T22:13:24Z",
|
||||
"updated_at": "2020-06-26T14:46:10Z",
|
||||
"pushed_at": "2020-01-05T22:23:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-25T07:48:55Z",
|
||||
"updated_at": "2020-08-26T02:57:47Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1534,
|
||||
"watchers_count": 1534,
|
||||
"stargazers_count": 1536,
|
||||
"watchers_count": 1536,
|
||||
"forks_count": 398,
|
||||
"forks": 398,
|
||||
"watchers": 1534,
|
||||
"watchers": 1536,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-08-20T22:19:43Z",
|
||||
"updated_at": "2020-08-26T00:13:02Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 301,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2020-08-20T10:37:08Z",
|
||||
"updated_at": "2020-08-26T01:30:02Z",
|
||||
"pushed_at": "2020-08-20T10:37:06Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -88,13 +88,16 @@ Race condition in the Intel(R) Driver and Support Assistant before version 20.1.
|
|||
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601)
|
||||
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
|
||||
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
|
||||
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
|
||||
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
|
||||
- [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall)
|
||||
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
|
||||
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
|
||||
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
|
||||
- [apmunch/CVE-2020-0601](https://github.com/apmunch/CVE-2020-0601)
|
||||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
|
||||
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
|
||||
|
@ -571,6 +574,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551)
|
||||
- [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551)
|
||||
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
|
||||
- [cnsimo/CVE-2020-2551](https://github.com/cnsimo/CVE-2020-2551)
|
||||
- [zzwlpx/weblogicPoc](https://github.com/zzwlpx/weblogicPoc)
|
||||
- [Dido1960/Weblogic-CVE-2020-2551-To-Internet](https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet)
|
||||
|
||||
|
@ -750,6 +754,14 @@ Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.
|
|||
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
|
||||
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
|
||||
|
||||
### CVE-2020-5509
|
||||
|
||||
<code>
|
||||
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
|
||||
</code>
|
||||
|
||||
- [FULLSHADE/CVE-2020-5509](https://github.com/FULLSHADE/CVE-2020-5509)
|
||||
|
||||
### CVE-2020-5837
|
||||
|
||||
<code>
|
||||
|
@ -1959,6 +1971,9 @@ An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authentic
|
|||
|
||||
- [lb0x/cve-2020-24572](https://github.com/lb0x/cve-2020-24572)
|
||||
|
||||
### CVE-2020-24597
|
||||
- [HoangKien1020/CVE-2020-24597](https://github.com/HoangKien1020/CVE-2020-24597)
|
||||
|
||||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue