mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/08/25 06:08:33
This commit is contained in:
parent
f3c95c181c
commit
8492400eb1
27 changed files with 149 additions and 125 deletions
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2017-09-06T20:13:10Z",
|
"pushed_at": "2017-09-06T20:13:10Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 13,
|
"watchers_count": 13,
|
||||||
"forks_count": 11,
|
"forks_count": 10,
|
||||||
"forks": 11,
|
"forks": 10,
|
||||||
"watchers": 13,
|
"watchers": 13,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-06-30T11:56:44Z",
|
"created_at": "2016-06-30T11:56:44Z",
|
||||||
"updated_at": "2020-08-11T13:37:17Z",
|
"updated_at": "2020-08-24T15:11:29Z",
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 282,
|
"stargazers_count": 283,
|
||||||
"watchers_count": 282,
|
"watchers_count": 283,
|
||||||
"forks_count": 88,
|
"forks_count": 88,
|
||||||
"forks": 88,
|
"forks": 88,
|
||||||
"watchers": 282,
|
"watchers": 283,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Qualcomm TrustZone kernel privilege escalation",
|
"description": "Qualcomm TrustZone kernel privilege escalation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-06-15T11:21:24Z",
|
"created_at": "2016-06-15T11:21:24Z",
|
||||||
"updated_at": "2020-07-31T09:13:27Z",
|
"updated_at": "2020-08-24T15:11:33Z",
|
||||||
"pushed_at": "2016-06-15T11:27:42Z",
|
"pushed_at": "2016-06-15T11:27:42Z",
|
||||||
"stargazers_count": 42,
|
"stargazers_count": 43,
|
||||||
"watchers_count": 42,
|
"watchers_count": 43,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 42,
|
"watchers": 43,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -36,13 +36,13 @@
|
||||||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-06-30T11:56:44Z",
|
"created_at": "2016-06-30T11:56:44Z",
|
||||||
"updated_at": "2020-08-11T13:37:17Z",
|
"updated_at": "2020-08-24T15:11:29Z",
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 282,
|
"stargazers_count": 283,
|
||||||
"watchers_count": 282,
|
"watchers_count": 283,
|
||||||
"forks_count": 88,
|
"forks_count": 88,
|
||||||
"forks": 88,
|
"forks": 88,
|
||||||
"watchers": 282,
|
"watchers": 283,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
|
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-09-16T07:34:50Z",
|
"created_at": "2016-09-16T07:34:50Z",
|
||||||
"updated_at": "2020-06-13T14:45:33Z",
|
"updated_at": "2020-08-24T17:38:26Z",
|
||||||
"pushed_at": "2016-09-18T06:55:38Z",
|
"pushed_at": "2016-09-18T06:55:38Z",
|
||||||
"stargazers_count": 78,
|
"stargazers_count": 77,
|
||||||
"watchers_count": 78,
|
"watchers_count": 77,
|
||||||
"forks_count": 20,
|
"forks_count": 20,
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 78,
|
"watchers": 77,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2017-01-04T23:42:46Z",
|
"pushed_at": "2017-01-04T23:42:46Z",
|
||||||
"stargazers_count": 132,
|
"stargazers_count": 132,
|
||||||
"watchers_count": 132,
|
"watchers_count": 132,
|
||||||
"forks_count": 52,
|
"forks_count": 51,
|
||||||
"forks": 52,
|
"forks": 51,
|
||||||
"watchers": 132,
|
"watchers": 132,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
|
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-09-23T06:15:48Z",
|
"created_at": "2017-09-23T06:15:48Z",
|
||||||
"updated_at": "2020-08-17T13:46:09Z",
|
"updated_at": "2020-08-24T15:57:51Z",
|
||||||
"pushed_at": "2019-12-20T07:22:17Z",
|
"pushed_at": "2019-12-20T07:22:17Z",
|
||||||
"stargazers_count": 71,
|
"stargazers_count": 72,
|
||||||
"watchers_count": 71,
|
"watchers_count": 72,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 71,
|
"watchers": 72,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-06-24T05:34:05Z",
|
"created_at": "2018-06-24T05:34:05Z",
|
||||||
"updated_at": "2020-08-17T12:15:44Z",
|
"updated_at": "2020-08-24T19:40:30Z",
|
||||||
"pushed_at": "2020-03-08T00:08:20Z",
|
"pushed_at": "2020-03-08T00:08:20Z",
|
||||||
"stargazers_count": 372,
|
"stargazers_count": 373,
|
||||||
"watchers_count": 372,
|
"watchers_count": 373,
|
||||||
"forks_count": 336,
|
"forks_count": 336,
|
||||||
"forks": 336,
|
"forks": 336,
|
||||||
"watchers": 372,
|
"watchers": 373,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2018-08-17T23:31:46Z",
|
"pushed_at": "2018-08-17T23:31:46Z",
|
||||||
"stargazers_count": 152,
|
"stargazers_count": 152,
|
||||||
"watchers_count": 152,
|
"watchers_count": 152,
|
||||||
"forks_count": 30,
|
"forks_count": 31,
|
||||||
"forks": 30,
|
"forks": 31,
|
||||||
"watchers": 152,
|
"watchers": 152,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-04-28T11:50:00Z",
|
"created_at": "2018-04-28T11:50:00Z",
|
||||||
"updated_at": "2020-08-11T04:34:42Z",
|
"updated_at": "2020-08-24T18:12:19Z",
|
||||||
"pushed_at": "2018-08-30T05:37:03Z",
|
"pushed_at": "2018-08-30T05:37:03Z",
|
||||||
"stargazers_count": 405,
|
"stargazers_count": 406,
|
||||||
"watchers_count": 405,
|
"watchers_count": 406,
|
||||||
"forks_count": 53,
|
"forks_count": 53,
|
||||||
"forks": 53,
|
"forks": 53,
|
||||||
"watchers": 405,
|
"watchers": 406,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2018-05-03T17:20:24Z",
|
"pushed_at": "2018-05-03T17:20:24Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "CVE-2019-0230 & s2-059 poc.",
|
"description": "CVE-2019-0230 & s2-059 poc.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-20T08:21:54Z",
|
"created_at": "2020-08-20T08:21:54Z",
|
||||||
"updated_at": "2020-08-24T14:52:07Z",
|
"updated_at": "2020-08-24T18:08:35Z",
|
||||||
"pushed_at": "2020-08-21T12:41:14Z",
|
"pushed_at": "2020-08-21T12:41:14Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1094,13 +1094,13 @@
|
||||||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-22T00:08:44Z",
|
"created_at": "2019-05-22T00:08:44Z",
|
||||||
"updated_at": "2020-08-21T05:53:06Z",
|
"updated_at": "2020-08-24T19:02:25Z",
|
||||||
"pushed_at": "2019-10-01T12:23:59Z",
|
"pushed_at": "2019-10-01T12:23:59Z",
|
||||||
"stargazers_count": 1115,
|
"stargazers_count": 1114,
|
||||||
"watchers_count": 1115,
|
"watchers_count": 1114,
|
||||||
"forks_count": 379,
|
"forks_count": 379,
|
||||||
"forks": 379,
|
"forks": 379,
|
||||||
"watchers": 1115,
|
"watchers": 1114,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1301,13 +1301,13 @@
|
||||||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-23T22:50:12Z",
|
"created_at": "2019-05-23T22:50:12Z",
|
||||||
"updated_at": "2020-08-23T10:01:57Z",
|
"updated_at": "2020-08-24T19:01:58Z",
|
||||||
"pushed_at": "2019-06-22T21:48:45Z",
|
"pushed_at": "2019-06-22T21:48:45Z",
|
||||||
"stargazers_count": 754,
|
"stargazers_count": 753,
|
||||||
"watchers_count": 754,
|
"watchers_count": 753,
|
||||||
"forks_count": 182,
|
"forks_count": 182,
|
||||||
"forks": 182,
|
"forks": 182,
|
||||||
"watchers": 754,
|
"watchers": 753,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -201,8 +201,8 @@
|
||||||
"pushed_at": "2019-12-25T13:48:27Z",
|
"pushed_at": "2019-12-25T13:48:27Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 8,
|
"watchers_count": 8,
|
||||||
"forks_count": 3,
|
"forks_count": 2,
|
||||||
"forks": 3,
|
"forks": 2,
|
||||||
"watchers": 8,
|
"watchers": 8,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -228,5 +228,28 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 289977484,
|
||||||
|
"name": "CVE-2019-16759",
|
||||||
|
"full_name": "sunian19\/CVE-2019-16759",
|
||||||
|
"owner": {
|
||||||
|
"login": "sunian19",
|
||||||
|
"id": 53205380,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53205380?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/sunian19"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/sunian19\/CVE-2019-16759",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-08-24T16:15:10Z",
|
||||||
|
"updated_at": "2020-08-24T16:25:07Z",
|
||||||
|
"pushed_at": "2020-08-24T16:25:04Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-08-24T06:58:14Z",
|
"updated_at": "2020-08-24T19:17:29Z",
|
||||||
"pushed_at": "2020-08-03T04:37:30Z",
|
"pushed_at": "2020-08-03T04:37:30Z",
|
||||||
"stargazers_count": 1528,
|
"stargazers_count": 1529,
|
||||||
"watchers_count": 1528,
|
"watchers_count": 1529,
|
||||||
"forks_count": 398,
|
"forks_count": 398,
|
||||||
"forks": 398,
|
"forks": 398,
|
||||||
"watchers": 1528,
|
"watchers": 1529,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Proof of Concept for CVE-2019-18634",
|
"description": "Proof of Concept for CVE-2019-18634",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-07T18:07:03Z",
|
"created_at": "2020-02-07T18:07:03Z",
|
||||||
"updated_at": "2020-08-22T23:48:37Z",
|
"updated_at": "2020-08-24T15:29:53Z",
|
||||||
"pushed_at": "2020-06-04T13:17:10Z",
|
"pushed_at": "2020-06-04T13:17:10Z",
|
||||||
"stargazers_count": 67,
|
"stargazers_count": 68,
|
||||||
"watchers_count": 67,
|
"watchers_count": 68,
|
||||||
"forks_count": 17,
|
"forks_count": 17,
|
||||||
"forks": 17,
|
"forks": 17,
|
||||||
"watchers": 67,
|
"watchers": 68,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 289938288,
|
|
||||||
"name": "CVE-2020-0002",
|
|
||||||
"full_name": "Polo35\/CVE-2020-0002",
|
|
||||||
"owner": {
|
|
||||||
"login": "Polo35",
|
|
||||||
"id": 489662,
|
|
||||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/489662?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/Polo35"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0002",
|
|
||||||
"description": "CVE-2020-0002 vulnerability experimentations",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-08-24T13:38:23Z",
|
|
||||||
"updated_at": "2020-08-24T13:40:39Z",
|
|
||||||
"pushed_at": "2020-08-24T13:38:24Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -46,7 +46,7 @@
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 289939274,
|
"id": 290022016,
|
||||||
"name": "CVE-2020-0022",
|
"name": "CVE-2020-0022",
|
||||||
"full_name": "Polo35\/CVE-2020-0022",
|
"full_name": "Polo35\/CVE-2020-0022",
|
||||||
"owner": {
|
"owner": {
|
||||||
|
@ -58,9 +58,9 @@
|
||||||
"html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0022",
|
"html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0022",
|
||||||
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-08-24T13:42:25Z",
|
"created_at": "2020-08-24T19:33:10Z",
|
||||||
"updated_at": "2020-08-24T14:35:44Z",
|
"updated_at": "2020-08-24T19:34:41Z",
|
||||||
"pushed_at": "2020-08-24T14:35:41Z",
|
"pushed_at": "2020-08-24T19:34:39Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Support ALL Windows Version",
|
"description": "Support ALL Windows Version",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-16T08:57:51Z",
|
"created_at": "2020-06-16T08:57:51Z",
|
||||||
"updated_at": "2020-08-24T10:33:28Z",
|
"updated_at": "2020-08-24T15:16:52Z",
|
||||||
"pushed_at": "2020-06-18T00:42:57Z",
|
"pushed_at": "2020-06-18T00:42:57Z",
|
||||||
"stargazers_count": 399,
|
"stargazers_count": 400,
|
||||||
"watchers_count": 399,
|
"watchers_count": 400,
|
||||||
"forks_count": 95,
|
"forks_count": 95,
|
||||||
"forks": 95,
|
"forks": 95,
|
||||||
"watchers": 399,
|
"watchers": 400,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,8 +36,8 @@
|
||||||
"description": "Zeek Plugin that detects CallStranger (CVE-2020-12695) attempts (http:\/\/callstranger.com\/)",
|
"description": "Zeek Plugin that detects CallStranger (CVE-2020-12695) attempts (http:\/\/callstranger.com\/)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-10T14:18:34Z",
|
"created_at": "2020-06-10T14:18:34Z",
|
||||||
"updated_at": "2020-06-11T19:14:12Z",
|
"updated_at": "2020-08-24T19:45:22Z",
|
||||||
"pushed_at": "2020-06-10T16:35:16Z",
|
"pushed_at": "2020-08-24T19:45:19Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 4,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
|
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-29T15:56:50Z",
|
"created_at": "2020-07-29T15:56:50Z",
|
||||||
"updated_at": "2020-08-23T15:34:03Z",
|
"updated_at": "2020-08-24T19:01:26Z",
|
||||||
"pushed_at": "2020-07-30T07:48:40Z",
|
"pushed_at": "2020-07-30T07:48:40Z",
|
||||||
"stargazers_count": 99,
|
"stargazers_count": 100,
|
||||||
"watchers_count": 99,
|
"watchers_count": 100,
|
||||||
"forks_count": 17,
|
"forks_count": 17,
|
||||||
"forks": 17,
|
"forks": 17,
|
||||||
"watchers": 99,
|
"watchers": 100,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-21T08:01:20Z",
|
"created_at": "2020-07-21T08:01:20Z",
|
||||||
"updated_at": "2020-08-24T08:10:35Z",
|
"updated_at": "2020-08-24T17:21:50Z",
|
||||||
"pushed_at": "2020-07-21T10:28:42Z",
|
"pushed_at": "2020-07-21T10:28:42Z",
|
||||||
"stargazers_count": 125,
|
"stargazers_count": 126,
|
||||||
"watchers_count": 125,
|
"watchers_count": 126,
|
||||||
"forks_count": 22,
|
"forks_count": 22,
|
||||||
"forks": 22,
|
"forks": 22,
|
||||||
"watchers": 125,
|
"watchers": 126,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-07-18T05:15:05Z",
|
"created_at": "2020-07-18T05:15:05Z",
|
||||||
"updated_at": "2020-08-23T22:33:58Z",
|
"updated_at": "2020-08-24T17:01:42Z",
|
||||||
"pushed_at": "2020-07-18T11:52:31Z",
|
"pushed_at": "2020-07-18T11:52:31Z",
|
||||||
"stargazers_count": 64,
|
"stargazers_count": 65,
|
||||||
"watchers_count": 64,
|
"watchers_count": 65,
|
||||||
"forks_count": 8,
|
"forks_count": 9,
|
||||||
"forks": 8,
|
"forks": 9,
|
||||||
"watchers": 64,
|
"watchers": 65,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
25
2020/CVE-2020-24572.json
Normal file
25
2020/CVE-2020-24572.json
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 289633451,
|
||||||
|
"name": "cve-2020-24572",
|
||||||
|
"full_name": "lb0x\/cve-2020-24572",
|
||||||
|
"owner": {
|
||||||
|
"login": "lb0x",
|
||||||
|
"id": 336581,
|
||||||
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/336581?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/lb0x"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/lb0x\/cve-2020-24572",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-08-23T06:58:04Z",
|
||||||
|
"updated_at": "2020-08-24T20:44:45Z",
|
||||||
|
"pushed_at": "2020-08-24T20:39:51Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-08-24T06:58:14Z",
|
"updated_at": "2020-08-24T19:17:29Z",
|
||||||
"pushed_at": "2020-08-03T04:37:30Z",
|
"pushed_at": "2020-08-03T04:37:30Z",
|
||||||
"stargazers_count": 1528,
|
"stargazers_count": 1529,
|
||||||
"watchers_count": 1528,
|
"watchers_count": 1529,
|
||||||
"forks_count": 398,
|
"forks_count": 398,
|
||||||
"forks": 398,
|
"forks": 398,
|
||||||
"watchers": 1528,
|
"watchers": 1529,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Python exploit of cve-2020-7247",
|
"description": "Python exploit of cve-2020-7247",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-30T19:29:27Z",
|
"created_at": "2020-01-30T19:29:27Z",
|
||||||
"updated_at": "2020-07-19T21:18:23Z",
|
"updated_at": "2020-08-24T16:37:57Z",
|
||||||
"pushed_at": "2020-02-19T10:55:15Z",
|
"pushed_at": "2020-02-19T10:55:15Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"forks_count": 8,
|
"forks_count": 9,
|
||||||
"forks": 8,
|
"forks": 9,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
17
README.md
17
README.md
|
@ -1,14 +1,6 @@
|
||||||
# PoC in GitHub
|
# PoC in GitHub
|
||||||
|
|
||||||
## 2020
|
## 2020
|
||||||
### CVE-2020-0002
|
|
||||||
|
|
||||||
<code>
|
|
||||||
In ih264d_init_decoder of ih264d_api.c, there is a possible out of bounds write due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-142602711
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [Polo35/CVE-2020-0002](https://github.com/Polo35/CVE-2020-0002)
|
|
||||||
|
|
||||||
### CVE-2020-0022
|
### CVE-2020-0022
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -1962,6 +1954,14 @@ vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWid
|
||||||
### CVE-2020-24033
|
### CVE-2020-24033
|
||||||
- [M0NsTeRRR/CVE-2020-24033](https://github.com/M0NsTeRRR/CVE-2020-24033)
|
- [M0NsTeRRR/CVE-2020-24033](https://github.com/M0NsTeRRR/CVE-2020-24033)
|
||||||
|
|
||||||
|
### CVE-2020-24572
|
||||||
|
|
||||||
|
<code>
|
||||||
|
An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [lb0x/cve-2020-24572](https://github.com/lb0x/cve-2020-24572)
|
||||||
|
|
||||||
### CVE-2020-72381
|
### CVE-2020-72381
|
||||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||||
|
|
||||||
|
@ -4757,6 +4757,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
|
||||||
- [jd-961/CVE-2019-16759-bypass](https://github.com/jd-961/CVE-2019-16759-bypass)
|
- [jd-961/CVE-2019-16759-bypass](https://github.com/jd-961/CVE-2019-16759-bypass)
|
||||||
- [nako48/CVE-2019-16759](https://github.com/nako48/CVE-2019-16759)
|
- [nako48/CVE-2019-16759](https://github.com/nako48/CVE-2019-16759)
|
||||||
- [mas1337/CVE-2019-16759](https://github.com/mas1337/CVE-2019-16759)
|
- [mas1337/CVE-2019-16759](https://github.com/mas1337/CVE-2019-16759)
|
||||||
|
- [sunian19/CVE-2019-16759](https://github.com/sunian19/CVE-2019-16759)
|
||||||
|
|
||||||
### CVE-2019-16784
|
### CVE-2019-16784
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue