mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/10/20 06:09:27
This commit is contained in:
parent
f0dcc28a24
commit
66e83c26ee
12 changed files with 56 additions and 51 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2020-10-11T09:11:57Z",
|
||||
"updated_at": "2020-10-19T16:23:48Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1213,8 +1213,8 @@
|
|||
"pushed_at": "2020-09-29T05:21:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 138,
|
||||
"forks": 138,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2393,19 +2393,19 @@
|
|||
},
|
||||
{
|
||||
"id": 222191780,
|
||||
"name": "sudoku.py",
|
||||
"full_name": "lwtz\/sudoku.py",
|
||||
"name": "CVE-2019-0708",
|
||||
"full_name": "lwtz\/CVE-2019-0708",
|
||||
"owner": {
|
||||
"login": "lwtz",
|
||||
"id": 25403119,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25403119?v=4",
|
||||
"html_url": "https:\/\/github.com\/lwtz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lwtz\/sudoku.py",
|
||||
"html_url": "https:\/\/github.com\/lwtz\/CVE-2019-0708",
|
||||
"description": "CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-17T03:28:28Z",
|
||||
"updated_at": "2020-07-19T00:58:26Z",
|
||||
"updated_at": "2020-10-19T18:21:25Z",
|
||||
"pushed_at": "2020-07-19T00:58:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2020-10-15T19:48:38Z",
|
||||
"updated_at": "2020-10-19T15:20:29Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-10-16T06:29:41Z",
|
||||
"updated_at": "2020-10-19T15:20:39Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 226,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T15:29:52Z",
|
||||
"updated_at": "2020-10-18T19:03:58Z",
|
||||
"updated_at": "2020-10-19T15:20:34Z",
|
||||
"pushed_at": "2020-04-01T06:57:50Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T21:40:57Z",
|
||||
"updated_at": "2020-08-17T01:35:29Z",
|
||||
"updated_at": "2020-10-19T15:31:42Z",
|
||||
"pushed_at": "2020-04-01T19:34:36Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2020-10-17T04:32:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2020-10-19T07:50:40Z",
|
||||
"updated_at": "2020-10-19T17:57:12Z",
|
||||
"pushed_at": "2020-10-15T14:57:31Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-10-14T17:42:24Z",
|
||||
"updated_at": "2020-10-19T19:35:34Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,11 +14,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2020-10-12T06:24:29Z",
|
||||
"pushed_at": "2020-08-27T06:41:01Z",
|
||||
"pushed_at": "2020-10-19T18:03:23Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -2257,7 +2257,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
|
|||
### CVE-2020-16270
|
||||
|
||||
<code>
|
||||
OLIMPOKS before 5.1.0 allows Auth/Admin ErrorMessage XSS.
|
||||
OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can use discovered vulnerability to inject malicious JavaScript payload to victim’s browsers in context of vulnerable applications. Executed code can be used to steal administrator’s cookies, influence HTML content of targeted application and perform phishing-related attacks. Vulnerable application used in more than 3000 organizations in different sectors from retail to industries.
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2020-16270](https://github.com/Security-AVS/CVE-2020-16270)
|
||||
|
@ -2766,7 +2766,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [shishibabyq/CVE-2019-0708](https://github.com/shishibabyq/CVE-2019-0708)
|
||||
- [pwnhacker0x18/Wincrash](https://github.com/pwnhacker0x18/Wincrash)
|
||||
- [R4v3nG/CVE-2019-0708-DOS](https://github.com/R4v3nG/CVE-2019-0708-DOS)
|
||||
- [lwtz/sudoku.py](https://github.com/lwtz/sudoku.py)
|
||||
- [lwtz/CVE-2019-0708](https://github.com/lwtz/CVE-2019-0708)
|
||||
- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708)
|
||||
- [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708)
|
||||
- [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows)
|
||||
|
@ -4899,6 +4899,11 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
|
|||
- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
|
||||
|
||||
### CVE-2019-13633
|
||||
|
||||
<code>
|
||||
Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can send arbitrary JavaScript code via a built-in communication channel, such as Telegram, WhatsApp, Viber, Skype, Facebook, Vkontakte, or Odnoklassniki. This is mishandled within the administration panel for conversations/all, conversations/inbox, conversations/unassigned, and conversations/closed.
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2019-13633](https://github.com/Security-AVS/CVE-2019-13633)
|
||||
|
||||
### CVE-2019-13720
|
||||
|
|
Loading…
Reference in a new issue