mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/01/09 12:09:46
This commit is contained in:
parent
50fa3e37cd
commit
75690166fa
14 changed files with 61 additions and 61 deletions
|
@ -13,13 +13,13 @@
|
||||||
"description": "A checker (site and tool) for CVE-2014-0160",
|
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2014-04-07T23:03:09Z",
|
"created_at": "2014-04-07T23:03:09Z",
|
||||||
"updated_at": "2021-01-05T20:01:24Z",
|
"updated_at": "2021-01-08T23:24:12Z",
|
||||||
"pushed_at": "2016-05-07T19:35:14Z",
|
"pushed_at": "2016-05-07T19:35:14Z",
|
||||||
"stargazers_count": 2247,
|
"stargazers_count": 2246,
|
||||||
"watchers_count": 2247,
|
"watchers_count": 2246,
|
||||||
"forks_count": 485,
|
"forks_count": 486,
|
||||||
"forks": 485,
|
"forks": 486,
|
||||||
"watchers": 2247,
|
"watchers": 2246,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -174,13 +174,13 @@
|
||||||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-04-05T23:21:12Z",
|
"created_at": "2017-04-05T23:21:12Z",
|
||||||
"updated_at": "2021-01-07T09:24:02Z",
|
"updated_at": "2021-01-08T23:47:37Z",
|
||||||
"pushed_at": "2017-04-05T23:29:03Z",
|
"pushed_at": "2017-04-05T23:29:03Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"forks_count": 30,
|
"forks_count": 30,
|
||||||
"forks": 30,
|
"forks": 30,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -473,8 +473,8 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-10-18T14:01:59Z",
|
"created_at": "2020-10-18T14:01:59Z",
|
||||||
"updated_at": "2021-01-07T21:53:41Z",
|
"updated_at": "2021-01-08T23:10:47Z",
|
||||||
"pushed_at": "2021-01-07T21:53:39Z",
|
"pushed_at": "2021-01-08T23:10:45Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Proof of Concept for CVE-2019-18634",
|
"description": "Proof of Concept for CVE-2019-18634",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-07T18:07:03Z",
|
"created_at": "2020-02-07T18:07:03Z",
|
||||||
"updated_at": "2021-01-02T07:03:14Z",
|
"updated_at": "2021-01-09T00:44:25Z",
|
||||||
"pushed_at": "2020-06-04T13:17:10Z",
|
"pushed_at": "2020-06-04T13:17:10Z",
|
||||||
"stargazers_count": 82,
|
"stargazers_count": 83,
|
||||||
"watchers_count": 82,
|
"watchers_count": 83,
|
||||||
"forks_count": 27,
|
"forks_count": 28,
|
||||||
"forks": 27,
|
"forks": 28,
|
||||||
"watchers": 82,
|
"watchers": 83,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2019-05-08T16:22:58Z",
|
"pushed_at": "2019-05-08T16:22:58Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 54,
|
||||||
"watchers_count": 54,
|
"watchers_count": 54,
|
||||||
"forks_count": 35,
|
"forks_count": 36,
|
||||||
"forks": 35,
|
"forks": 36,
|
||||||
"watchers": 54,
|
"watchers": 54,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -910,13 +910,13 @@
|
||||||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-30T11:42:56Z",
|
"created_at": "2020-03-30T11:42:56Z",
|
||||||
"updated_at": "2021-01-08T07:27:55Z",
|
"updated_at": "2021-01-09T02:41:33Z",
|
||||||
"pushed_at": "2020-12-07T20:04:27Z",
|
"pushed_at": "2020-12-07T20:04:27Z",
|
||||||
"stargazers_count": 1058,
|
"stargazers_count": 1059,
|
||||||
"watchers_count": 1058,
|
"watchers_count": 1059,
|
||||||
"forks_count": 355,
|
"forks_count": 355,
|
||||||
"forks": 355,
|
"forks": 355,
|
||||||
"watchers": 1058,
|
"watchers": 1059,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
"description": "CVE-2020-14179 Scanner",
|
"description": "CVE-2020-14179 Scanner",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-08T14:15:24Z",
|
"created_at": "2021-01-08T14:15:24Z",
|
||||||
"updated_at": "2021-01-08T20:57:40Z",
|
"updated_at": "2021-01-08T21:20:59Z",
|
||||||
"pushed_at": "2021-01-08T20:57:38Z",
|
"pushed_at": "2021-01-08T20:57:38Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-10-09T06:34:36Z",
|
"created_at": "2020-10-09T06:34:36Z",
|
||||||
"updated_at": "2021-01-08T18:03:54Z",
|
"updated_at": "2021-01-09T01:36:24Z",
|
||||||
"pushed_at": "2021-01-08T11:00:13Z",
|
"pushed_at": "2021-01-08T11:00:13Z",
|
||||||
"stargazers_count": 699,
|
"stargazers_count": 702,
|
||||||
"watchers_count": 699,
|
"watchers_count": 702,
|
||||||
"forks_count": 124,
|
"forks_count": 124,
|
||||||
"forks": 124,
|
"forks": 124,
|
||||||
"watchers": 699,
|
"watchers": 702,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -298,29 +298,6 @@
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 306899847,
|
|
||||||
"name": "CVE-2020-16898",
|
|
||||||
"full_name": "Passive\/CVE-2020-16898",
|
|
||||||
"owner": {
|
|
||||||
"login": "Passive",
|
|
||||||
"id": 40716556,
|
|
||||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40716556?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/Passive"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/Passive\/CVE-2020-16898",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-10-24T14:21:14Z",
|
|
||||||
"updated_at": "2020-10-24T14:23:22Z",
|
|
||||||
"pushed_at": "2020-10-24T14:23:21Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 307994197,
|
"id": 307994197,
|
||||||
"name": "CVE-2020-16898--EXP-POC",
|
"name": "CVE-2020-16898--EXP-POC",
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exchange2010 authorized RCE",
|
"description": "Exchange2010 authorized RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-12-09T10:30:16Z",
|
"created_at": "2020-12-09T10:30:16Z",
|
||||||
"updated_at": "2021-01-08T16:57:00Z",
|
"updated_at": "2021-01-08T23:59:23Z",
|
||||||
"pushed_at": "2020-12-24T08:11:51Z",
|
"pushed_at": "2020-12-24T08:11:51Z",
|
||||||
"stargazers_count": 120,
|
"stargazers_count": 121,
|
||||||
"watchers_count": 120,
|
"watchers_count": 121,
|
||||||
"forks_count": 33,
|
"forks_count": 33,
|
||||||
"forks": 33,
|
"forks": 33,
|
||||||
"watchers": 120,
|
"watchers": 121,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
"description": "TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. ",
|
"description": "TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-12-10T18:13:47Z",
|
"created_at": "2020-12-10T18:13:47Z",
|
||||||
"updated_at": "2020-12-23T08:49:48Z",
|
"updated_at": "2021-01-08T23:15:08Z",
|
||||||
"pushed_at": "2020-12-10T21:32:32Z",
|
"pushed_at": "2021-01-08T23:15:05Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
|
|
|
@ -21,5 +21,28 @@
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 328026495,
|
||||||
|
"name": "CVE-2020-3161-REMAKE",
|
||||||
|
"full_name": "uromulou\/CVE-2020-3161-REMAKE",
|
||||||
|
"owner": {
|
||||||
|
"login": "uromulou",
|
||||||
|
"id": 54293496,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/54293496?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/uromulou"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/uromulou\/CVE-2020-3161-REMAKE",
|
||||||
|
"description": "Um simples 'remake' da falha 'CVE-2020-3161'.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2021-01-08T22:30:49Z",
|
||||||
|
"updated_at": "2021-01-08T23:47:55Z",
|
||||||
|
"pushed_at": "2021-01-08T23:47:53Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -316,8 +316,8 @@
|
||||||
"pushed_at": "2021-01-08T20:07:35Z",
|
"pushed_at": "2021-01-08T20:07:35Z",
|
||||||
"stargazers_count": 47,
|
"stargazers_count": 47,
|
||||||
"watchers_count": 47,
|
"watchers_count": 47,
|
||||||
"forks_count": 8,
|
"forks_count": 9,
|
||||||
"forks": 8,
|
"forks": 9,
|
||||||
"watchers": 47,
|
"watchers": 47,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -790,6 +790,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [uromulou/CVE-2020-3161](https://github.com/uromulou/CVE-2020-3161)
|
- [uromulou/CVE-2020-3161](https://github.com/uromulou/CVE-2020-3161)
|
||||||
|
- [uromulou/CVE-2020-3161-REMAKE](https://github.com/uromulou/CVE-2020-3161-REMAKE)
|
||||||
|
|
||||||
### CVE-2020-3187 (2020-05-06)
|
### CVE-2020-3187 (2020-05-06)
|
||||||
|
|
||||||
|
@ -2789,7 +2790,6 @@ A remote code execution vulnerability exists when the Windows TCP/IP stack impro
|
||||||
- [CPO-EH/CVE-2020-16898_Checker](https://github.com/CPO-EH/CVE-2020-16898_Checker)
|
- [CPO-EH/CVE-2020-16898_Checker](https://github.com/CPO-EH/CVE-2020-16898_Checker)
|
||||||
- [momika233/CVE-2020-16898-exp](https://github.com/momika233/CVE-2020-16898-exp)
|
- [momika233/CVE-2020-16898-exp](https://github.com/momika233/CVE-2020-16898-exp)
|
||||||
- [komomon/CVE-2020-16898-EXP-POC](https://github.com/komomon/CVE-2020-16898-EXP-POC)
|
- [komomon/CVE-2020-16898-EXP-POC](https://github.com/komomon/CVE-2020-16898-EXP-POC)
|
||||||
- [Passive/CVE-2020-16898](https://github.com/Passive/CVE-2020-16898)
|
|
||||||
- [komomon/CVE-2020-16898--EXP-POC](https://github.com/komomon/CVE-2020-16898--EXP-POC)
|
- [komomon/CVE-2020-16898--EXP-POC](https://github.com/komomon/CVE-2020-16898--EXP-POC)
|
||||||
|
|
||||||
### CVE-2020-16899 (2020-10-16)
|
### CVE-2020-16899 (2020-10-16)
|
||||||
|
|
Loading…
Reference in a new issue