mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/03/13 12:07:49
This commit is contained in:
parent
9d3998cd5d
commit
75f37bbd36
21 changed files with 171 additions and 137 deletions
|
@ -59,13 +59,13 @@
|
||||||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-04-17T08:10:07Z",
|
"created_at": "2017-04-17T08:10:07Z",
|
||||||
"updated_at": "2020-03-02T04:26:34Z",
|
"updated_at": "2020-03-13T02:41:20Z",
|
||||||
"pushed_at": "2017-11-19T11:01:16Z",
|
"pushed_at": "2017-11-19T11:01:16Z",
|
||||||
"stargazers_count": 614,
|
"stargazers_count": 613,
|
||||||
"watchers_count": 614,
|
"watchers_count": 613,
|
||||||
"forks_count": 274,
|
"forks_count": 274,
|
||||||
"forks": 274,
|
"forks": 274,
|
||||||
"watchers": 614,
|
"watchers": 613,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
|
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-05-30T09:55:55Z",
|
"created_at": "2017-05-30T09:55:55Z",
|
||||||
"updated_at": "2020-02-24T03:23:00Z",
|
"updated_at": "2020-03-13T01:54:07Z",
|
||||||
"pushed_at": "2020-01-06T16:29:51Z",
|
"pushed_at": "2020-01-06T16:29:51Z",
|
||||||
"stargazers_count": 104,
|
"stargazers_count": 105,
|
||||||
"watchers_count": 104,
|
"watchers_count": 105,
|
||||||
"forks_count": 28,
|
"forks_count": 28,
|
||||||
"forks": 28,
|
"forks": 28,
|
||||||
"watchers": 104,
|
"watchers": 105,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-02-22T04:52:08Z",
|
"created_at": "2019-02-22T04:52:08Z",
|
||||||
"updated_at": "2020-03-09T16:34:14Z",
|
"updated_at": "2020-03-13T00:06:27Z",
|
||||||
"pushed_at": "2019-08-05T10:45:34Z",
|
"pushed_at": "2019-08-05T10:45:34Z",
|
||||||
"stargazers_count": 386,
|
"stargazers_count": 387,
|
||||||
"watchers_count": 386,
|
"watchers_count": 387,
|
||||||
"forks_count": 170,
|
"forks_count": 170,
|
||||||
"forks": 170,
|
"forks": 170,
|
||||||
"watchers": 386,
|
"watchers": 387,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-07-20T03:59:18Z",
|
"created_at": "2018-07-20T03:59:18Z",
|
||||||
"updated_at": "2020-02-12T16:18:33Z",
|
"updated_at": "2020-03-13T02:53:14Z",
|
||||||
"pushed_at": "2018-07-20T12:46:50Z",
|
"pushed_at": "2018-07-20T12:46:50Z",
|
||||||
"stargazers_count": 119,
|
"stargazers_count": 118,
|
||||||
"watchers_count": 119,
|
"watchers_count": 118,
|
||||||
"forks_count": 43,
|
"forks_count": 43,
|
||||||
"forks": 43,
|
"forks": 43,
|
||||||
"watchers": 119,
|
"watchers": 118,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T08:30:14Z",
|
"created_at": "2020-03-11T08:30:14Z",
|
||||||
"updated_at": "2020-03-12T19:36:49Z",
|
"updated_at": "2020-03-13T02:25:57Z",
|
||||||
"pushed_at": "2020-03-11T09:59:01Z",
|
"pushed_at": "2020-03-11T09:59:01Z",
|
||||||
"stargazers_count": 38,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 38,
|
"watchers_count": 40,
|
||||||
"forks_count": 5,
|
"forks_count": 6,
|
||||||
"forks": 5,
|
"forks": 6,
|
||||||
"watchers": 38,
|
"watchers": 40,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
|
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-04-17T12:23:24Z",
|
"created_at": "2019-04-17T12:23:24Z",
|
||||||
"updated_at": "2020-03-11T07:25:46Z",
|
"updated_at": "2020-03-13T02:47:53Z",
|
||||||
"pushed_at": "2019-04-17T15:05:09Z",
|
"pushed_at": "2019-04-17T15:05:09Z",
|
||||||
"stargazers_count": 139,
|
"stargazers_count": 138,
|
||||||
"watchers_count": 139,
|
"watchers_count": 138,
|
||||||
"forks_count": 48,
|
"forks_count": 48,
|
||||||
"forks": 48,
|
"forks": 48,
|
||||||
"watchers": 139,
|
"watchers": 138,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -174,13 +174,13 @@
|
||||||
"description": "CVE-2019-2725 命令回显",
|
"description": "CVE-2019-2725 命令回显",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-29T01:57:05Z",
|
"created_at": "2019-05-29T01:57:05Z",
|
||||||
"updated_at": "2020-03-11T07:12:59Z",
|
"updated_at": "2020-03-13T02:27:44Z",
|
||||||
"pushed_at": "2019-08-08T09:48:20Z",
|
"pushed_at": "2019-08-08T09:48:20Z",
|
||||||
"stargazers_count": 305,
|
"stargazers_count": 307,
|
||||||
"watchers_count": 305,
|
"watchers_count": 307,
|
||||||
"forks_count": 135,
|
"forks_count": 135,
|
||||||
"forks": 135,
|
"forks": 135,
|
||||||
"watchers": 305,
|
"watchers": 307,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -82,13 +82,13 @@
|
||||||
"description": "CVE-2019-3396 confluence SSTI RCE",
|
"description": "CVE-2019-3396 confluence SSTI RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-04-10T02:15:47Z",
|
"created_at": "2019-04-10T02:15:47Z",
|
||||||
"updated_at": "2020-03-09T12:02:49Z",
|
"updated_at": "2020-03-13T02:48:28Z",
|
||||||
"pushed_at": "2019-04-12T01:46:33Z",
|
"pushed_at": "2019-04-12T01:46:33Z",
|
||||||
"stargazers_count": 145,
|
"stargazers_count": 144,
|
||||||
"watchers_count": 145,
|
"watchers_count": 144,
|
||||||
"forks_count": 62,
|
"forks_count": 62,
|
||||||
"forks": 62,
|
"forks": 62,
|
||||||
"watchers": 145,
|
"watchers": 144,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,8 +40,8 @@
|
||||||
"pushed_at": "2020-02-16T17:18:01Z",
|
"pushed_at": "2020-02-16T17:18:01Z",
|
||||||
"stargazers_count": 12,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 12,
|
"watchers_count": 12,
|
||||||
"forks_count": 4,
|
"forks_count": 5,
|
||||||
"forks": 4,
|
"forks": 5,
|
||||||
"watchers": 12,
|
"watchers": 12,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-23T22:29:46Z",
|
"created_at": "2020-01-23T22:29:46Z",
|
||||||
"updated_at": "2020-03-06T05:47:50Z",
|
"updated_at": "2020-03-13T01:23:47Z",
|
||||||
"pushed_at": "2020-01-24T15:21:06Z",
|
"pushed_at": "2020-01-24T15:21:06Z",
|
||||||
"stargazers_count": 191,
|
"stargazers_count": 192,
|
||||||
"watchers_count": 191,
|
"watchers_count": 192,
|
||||||
"forks_count": 50,
|
"forks_count": 50,
|
||||||
"forks": 50,
|
"forks": 50,
|
||||||
"watchers": 191,
|
"watchers": 192,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-02-26T09:24:45Z",
|
"pushed_at": "2020-02-26T09:24:45Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 16,
|
"watchers_count": 16,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 16,
|
"watchers": 16,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2020-0688 - Exchange",
|
"description": "CVE-2020-0688 - Exchange",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-26T12:28:11Z",
|
"created_at": "2020-02-26T12:28:11Z",
|
||||||
"updated_at": "2020-03-11T03:43:28Z",
|
"updated_at": "2020-03-13T01:47:23Z",
|
||||||
"pushed_at": "2020-02-27T03:50:07Z",
|
"pushed_at": "2020-02-27T03:50:07Z",
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 22,
|
||||||
"watchers_count": 21,
|
"watchers_count": 22,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 21,
|
"watchers": 22,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -201,8 +201,8 @@
|
||||||
"pushed_at": "2020-03-01T12:58:01Z",
|
"pushed_at": "2020-03-01T12:58:01Z",
|
||||||
"stargazers_count": 117,
|
"stargazers_count": 117,
|
||||||
"watchers_count": 117,
|
"watchers_count": 117,
|
||||||
"forks_count": 35,
|
"forks_count": 36,
|
||||||
"forks": 35,
|
"forks": 36,
|
||||||
"watchers": 117,
|
"watchers": 117,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-10T21:40:57Z",
|
"created_at": "2020-03-10T21:40:57Z",
|
||||||
"updated_at": "2020-03-12T21:09:11Z",
|
"updated_at": "2020-03-13T02:57:00Z",
|
||||||
"pushed_at": "2020-03-12T18:44:07Z",
|
"pushed_at": "2020-03-12T22:58:25Z",
|
||||||
"stargazers_count": 12,
|
"stargazers_count": 15,
|
||||||
"watchers_count": 12,
|
"watchers_count": 15,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 12,
|
"watchers": 15,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T06:51:58Z",
|
"created_at": "2020-03-11T06:51:58Z",
|
||||||
"updated_at": "2020-03-12T20:24:36Z",
|
"updated_at": "2020-03-13T03:06:21Z",
|
||||||
"pushed_at": "2020-03-12T08:50:23Z",
|
"pushed_at": "2020-03-13T00:50:55Z",
|
||||||
"stargazers_count": 32,
|
"stargazers_count": 45,
|
||||||
"watchers_count": 32,
|
"watchers_count": 45,
|
||||||
"forks_count": 11,
|
"forks_count": 13,
|
||||||
"forks": 11,
|
"forks": 13,
|
||||||
"watchers": 32,
|
"watchers": 45,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -82,13 +82,13 @@
|
||||||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T15:21:27Z",
|
"created_at": "2020-03-11T15:21:27Z",
|
||||||
"updated_at": "2020-03-12T21:01:53Z",
|
"updated_at": "2020-03-13T02:44:32Z",
|
||||||
"pushed_at": "2020-03-12T16:24:44Z",
|
"pushed_at": "2020-03-13T02:44:17Z",
|
||||||
"stargazers_count": 206,
|
"stargazers_count": 219,
|
||||||
"watchers_count": 206,
|
"watchers_count": 219,
|
||||||
"forks_count": 50,
|
"forks_count": 57,
|
||||||
"forks": 50,
|
"forks": 57,
|
||||||
"watchers": 206,
|
"watchers": 219,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -105,13 +105,13 @@
|
||||||
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T16:23:03Z",
|
"created_at": "2020-03-11T16:23:03Z",
|
||||||
"updated_at": "2020-03-12T10:10:28Z",
|
"updated_at": "2020-03-12T21:40:33Z",
|
||||||
"pushed_at": "2020-03-11T22:50:40Z",
|
"pushed_at": "2020-03-11T22:50:40Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -128,8 +128,8 @@
|
||||||
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
|
"description": "NSE script to detect vulnerable CVE-2020-0796 issue \"SMBGhost\"",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T17:51:29Z",
|
"created_at": "2020-03-11T17:51:29Z",
|
||||||
"updated_at": "2020-03-12T19:31:19Z",
|
"updated_at": "2020-03-12T22:06:40Z",
|
||||||
"pushed_at": "2020-03-12T19:31:17Z",
|
"pushed_at": "2020-03-12T22:06:38Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
@ -335,7 +335,7 @@
|
||||||
"description": "Check system is vulnerable CVE-2020-0796 (SMB v3)",
|
"description": "Check system is vulnerable CVE-2020-0796 (SMB v3)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T17:32:56Z",
|
"created_at": "2020-03-12T17:32:56Z",
|
||||||
"updated_at": "2020-03-12T17:43:01Z",
|
"updated_at": "2020-03-13T00:16:03Z",
|
||||||
"pushed_at": "2020-03-12T17:42:59Z",
|
"pushed_at": "2020-03-12T17:42:59Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
@ -381,8 +381,8 @@
|
||||||
"description": "SMBGhost (CVE-2020-0796) threaded scanner",
|
"description": "SMBGhost (CVE-2020-0796) threaded scanner",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T18:03:45Z",
|
"created_at": "2020-03-12T18:03:45Z",
|
||||||
"updated_at": "2020-03-12T18:42:55Z",
|
"updated_at": "2020-03-12T22:20:13Z",
|
||||||
"pushed_at": "2020-03-12T18:42:53Z",
|
"pushed_at": "2020-03-12T22:20:11Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
@ -404,13 +404,13 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T18:34:40Z",
|
"created_at": "2020-03-12T18:34:40Z",
|
||||||
"updated_at": "2020-03-12T19:31:33Z",
|
"updated_at": "2020-03-13T02:26:11Z",
|
||||||
"pushed_at": "2020-03-12T18:46:19Z",
|
"pushed_at": "2020-03-12T18:46:19Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 1,
|
"watchers_count": 3,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 1,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -427,8 +427,8 @@
|
||||||
"description": "Scanner script to identify hosts vulnerable to CVE-2020-0796",
|
"description": "Scanner script to identify hosts vulnerable to CVE-2020-0796",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T19:22:36Z",
|
"created_at": "2020-03-12T19:22:36Z",
|
||||||
"updated_at": "2020-03-12T20:55:27Z",
|
"updated_at": "2020-03-12T21:41:00Z",
|
||||||
"pushed_at": "2020-03-12T20:55:26Z",
|
"pushed_at": "2020-03-12T21:40:58Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
@ -450,13 +450,13 @@
|
||||||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T19:33:18Z",
|
"created_at": "2020-03-12T19:33:18Z",
|
||||||
"updated_at": "2020-03-12T19:59:22Z",
|
"updated_at": "2020-03-12T22:41:50Z",
|
||||||
"pushed_at": "2020-03-12T19:45:53Z",
|
"pushed_at": "2020-03-12T19:45:53Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 3,
|
"watchers_count": 5,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 5,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -496,13 +496,13 @@
|
||||||
"description": "SMBv3 RCE vulnerability in SMBv3",
|
"description": "SMBv3 RCE vulnerability in SMBv3",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T19:46:25Z",
|
"created_at": "2020-03-12T19:46:25Z",
|
||||||
"updated_at": "2020-03-12T19:53:29Z",
|
"updated_at": "2020-03-12T21:47:56Z",
|
||||||
"pushed_at": "2020-03-12T19:53:27Z",
|
"pushed_at": "2020-03-12T19:53:27Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -519,13 +519,13 @@
|
||||||
"description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11",
|
"description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T20:07:44Z",
|
"created_at": "2020-03-12T20:07:44Z",
|
||||||
"updated_at": "2020-03-12T20:45:25Z",
|
"updated_at": "2020-03-13T02:36:38Z",
|
||||||
"pushed_at": "2020-03-12T20:42:54Z",
|
"pushed_at": "2020-03-12T20:42:54Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 0,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -550,5 +550,28 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 246951836,
|
||||||
|
"name": "SMBGhosts",
|
||||||
|
"full_name": "IAreKyleW00t\/SMBGhosts",
|
||||||
|
"owner": {
|
||||||
|
"login": "IAreKyleW00t",
|
||||||
|
"id": 1072572,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1072572?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/IAreKyleW00t"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/IAreKyleW00t\/SMBGhosts",
|
||||||
|
"description": "Multithreaded Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-03-12T23:55:39Z",
|
||||||
|
"updated_at": "2020-03-13T02:27:41Z",
|
||||||
|
"pushed_at": "2020-03-13T02:27:38Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Powershell SMBv3 Compression checker",
|
"description": "Powershell SMBv3 Compression checker",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T09:13:48Z",
|
"created_at": "2020-03-11T09:13:48Z",
|
||||||
"updated_at": "2020-03-12T21:00:15Z",
|
"updated_at": "2020-03-13T02:07:53Z",
|
||||||
"pushed_at": "2020-03-12T21:00:13Z",
|
"pushed_at": "2020-03-12T21:47:21Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 7,
|
"watchers_count": 9,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 7,
|
"watchers": 9,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -312,13 +312,13 @@
|
||||||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-22T16:16:20Z",
|
"created_at": "2020-02-22T16:16:20Z",
|
||||||
"updated_at": "2020-03-12T15:36:26Z",
|
"updated_at": "2020-03-13T01:41:20Z",
|
||||||
"pushed_at": "2020-03-09T14:51:43Z",
|
"pushed_at": "2020-03-09T14:51:43Z",
|
||||||
"stargazers_count": 51,
|
"stargazers_count": 52,
|
||||||
"watchers_count": 51,
|
"watchers_count": 52,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"forks": 18,
|
"forks": 18,
|
||||||
"watchers": 51,
|
"watchers": 52,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-1947 poc",
|
"description": "CVE-2020-1947 poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-10T12:44:01Z",
|
"created_at": "2020-03-10T12:44:01Z",
|
||||||
"updated_at": "2020-03-12T11:22:43Z",
|
"updated_at": "2020-03-13T02:19:44Z",
|
||||||
"pushed_at": "2020-03-10T12:48:10Z",
|
"pushed_at": "2020-03-10T12:48:10Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 39,
|
"watchers_count": 40,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 39,
|
"watchers": 40,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -36,13 +36,13 @@
|
||||||
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
"description": "Apache ShardingSphere UI YAML解析远程代码执行漏洞",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-11T03:15:25Z",
|
"created_at": "2020-03-11T03:15:25Z",
|
||||||
"updated_at": "2020-03-12T13:53:16Z",
|
"updated_at": "2020-03-12T23:01:30Z",
|
||||||
"pushed_at": "2020-03-11T03:54:34Z",
|
"pushed_at": "2020-03-11T03:54:34Z",
|
||||||
"stargazers_count": 20,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 20,
|
"watchers_count": 21,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 20,
|
"watchers": 21,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-19T13:01:32Z",
|
"created_at": "2020-01-19T13:01:32Z",
|
||||||
"updated_at": "2020-03-12T18:37:33Z",
|
"updated_at": "2020-03-13T01:58:09Z",
|
||||||
"pushed_at": "2020-03-10T15:46:18Z",
|
"pushed_at": "2020-03-10T15:46:18Z",
|
||||||
"stargazers_count": 77,
|
"stargazers_count": 78,
|
||||||
"watchers_count": 77,
|
"watchers_count": 78,
|
||||||
"forks_count": 19,
|
"forks_count": 19,
|
||||||
"forks": 19,
|
"forks": 19,
|
||||||
"watchers": 77,
|
"watchers": 78,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-2555",
|
"description": "CVE-2020-2555",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-07T12:02:26Z",
|
"created_at": "2020-03-07T12:02:26Z",
|
||||||
"updated_at": "2020-03-12T10:20:31Z",
|
"updated_at": "2020-03-12T22:29:40Z",
|
||||||
"pushed_at": "2020-03-12T09:20:08Z",
|
"pushed_at": "2020-03-12T09:20:08Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-8597 pppd buffer overflow poc",
|
"description": "CVE-2020-8597 pppd buffer overflow poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-07T19:00:46Z",
|
"created_at": "2020-03-07T19:00:46Z",
|
||||||
"updated_at": "2020-03-12T15:20:06Z",
|
"updated_at": "2020-03-13T01:38:57Z",
|
||||||
"pushed_at": "2020-03-12T11:10:31Z",
|
"pushed_at": "2020-03-12T11:10:31Z",
|
||||||
"stargazers_count": 17,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 17,
|
"watchers_count": 19,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 17,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞",
|
"description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-24T07:43:12Z",
|
"created_at": "2020-02-24T07:43:12Z",
|
||||||
"updated_at": "2020-03-09T00:27:07Z",
|
"updated_at": "2020-03-13T01:55:00Z",
|
||||||
"pushed_at": "2020-02-24T07:45:37Z",
|
"pushed_at": "2020-02-24T07:45:37Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
11
README.md
11
README.md
|
@ -21,6 +21,11 @@ In the ioctl handlers of the Mediatek Command Queue driver, there is a possible
|
||||||
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
|
- [yanglingxi1993/CVE-2020-0069](https://github.com/yanglingxi1993/CVE-2020-0069)
|
||||||
|
|
||||||
### CVE-2020-0551
|
### CVE-2020-0551
|
||||||
|
|
||||||
|
<code>
|
||||||
|
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
|
||||||
|
</code>
|
||||||
|
|
||||||
- [bitdefender/lvi-lfb-attack-poc](https://github.com/bitdefender/lvi-lfb-attack-poc)
|
- [bitdefender/lvi-lfb-attack-poc](https://github.com/bitdefender/lvi-lfb-attack-poc)
|
||||||
|
|
||||||
### CVE-2020-0601
|
### CVE-2020-0601
|
||||||
|
@ -173,6 +178,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
||||||
- [laolisafe/CVE-2020-0796](https://github.com/laolisafe/CVE-2020-0796)
|
- [laolisafe/CVE-2020-0796](https://github.com/laolisafe/CVE-2020-0796)
|
||||||
- [gabimarti/SMBScanner](https://github.com/gabimarti/SMBScanner)
|
- [gabimarti/SMBScanner](https://github.com/gabimarti/SMBScanner)
|
||||||
- [Almorabea/SMBGhost-WorkaroundApplier](https://github.com/Almorabea/SMBGhost-WorkaroundApplier)
|
- [Almorabea/SMBGhost-WorkaroundApplier](https://github.com/Almorabea/SMBGhost-WorkaroundApplier)
|
||||||
|
- [IAreKyleW00t/SMBGhosts](https://github.com/IAreKyleW00t/SMBGhosts)
|
||||||
|
|
||||||
### CVE-2020-0976
|
### CVE-2020-0976
|
||||||
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
||||||
|
@ -2286,6 +2292,11 @@ For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disable
|
||||||
- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633)
|
- [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633)
|
||||||
|
|
||||||
### CVE-2019-17658
|
### CVE-2019-17658
|
||||||
|
|
||||||
|
<code>
|
||||||
|
An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658)
|
- [Ibonok/CVE-2019-17658](https://github.com/Ibonok/CVE-2019-17658)
|
||||||
|
|
||||||
### CVE-2019-1821
|
### CVE-2019-1821
|
||||||
|
|
Loading…
Reference in a new issue