mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2020/03/17 00:07:30
This commit is contained in:
parent
01b444126d
commit
87182ee0f2
15 changed files with 96 additions and 96 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2014-11-19T03:55:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 178,
|
||||
"forks": 178,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 261,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T02:21:28Z",
|
||||
"updated_at": "2020-01-25T01:32:25Z",
|
||||
"updated_at": "2020-03-16T15:03:48Z",
|
||||
"pushed_at": "2019-05-09T07:07:25Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 23,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2020-03-14T08:23:19Z",
|
||||
"updated_at": "2020-03-16T14:26:23Z",
|
||||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 386,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-03-03T07:57:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2020-03-04T00:16:33Z",
|
||||
"updated_at": "2020-03-16T11:55:41Z",
|
||||
"pushed_at": "2019-10-29T02:02:34Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2020-03-15T21:27:38Z",
|
||||
"updated_at": "2020-03-16T09:45:02Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T12:42:54Z",
|
||||
"updated_at": "2020-03-13T16:14:08Z",
|
||||
"updated_at": "2020-03-16T09:42:43Z",
|
||||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-03-12T19:18:09Z",
|
||||
"updated_at": "2020-03-16T13:01:04Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 787,
|
||||
"watchers_count": 787,
|
||||
"stargazers_count": 786,
|
||||
"watchers_count": 786,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 787,
|
||||
"watchers": 786,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "A PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:15:32Z",
|
||||
"updated_at": "2020-03-12T18:54:01Z",
|
||||
"updated_at": "2020-03-16T13:01:02Z",
|
||||
"pushed_at": "2020-03-09T20:44:04Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 310,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2020-02-01T23:50:25Z",
|
||||
"updated_at": "2020-03-16T13:01:09Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 61,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,36 @@
|
|||
"description": "CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T06:51:58Z",
|
||||
"updated_at": "2020-03-16T08:00:50Z",
|
||||
"updated_at": "2020-03-16T14:50:41Z",
|
||||
"pushed_at": "2020-03-13T00:50:55Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 131,
|
||||
"watchers": 135,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246525183,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "T13nn3s\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "T13nn3s",
|
||||
"id": 29333776,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
|
||||
"html_url": "https:\/\/github.com\/T13nn3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0796",
|
||||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-03-16T10:45:43Z",
|
||||
"pushed_at": "2020-03-13T14:22:00Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-03-16T07:59:10Z",
|
||||
"updated_at": "2020-03-16T15:00:51Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 355,
|
||||
"watchers": 357,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -404,13 +427,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-03-16T07:26:02Z",
|
||||
"updated_at": "2020-03-16T14:24:16Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 113,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +473,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T19:33:18Z",
|
||||
"updated_at": "2020-03-16T08:49:13Z",
|
||||
"updated_at": "2020-03-16T12:52:47Z",
|
||||
"pushed_at": "2020-03-13T07:38:43Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 246525183,
|
||||
"name": "CVE-2020-0976",
|
||||
"full_name": "T13nn3s\/CVE-2020-0976",
|
||||
"owner": {
|
||||
"login": "T13nn3s",
|
||||
"id": 29333776,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
|
||||
"html_url": "https:\/\/github.com\/T13nn3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-0976",
|
||||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-03-15T06:44:18Z",
|
||||
"pushed_at": "2020-03-13T14:22:00Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 247235721,
|
||||
"name": "GUI-Check-CVE-2020-0976",
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-03-13T01:41:20Z",
|
||||
"updated_at": "2020-03-16T09:51:41Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-03-15T08:30:35Z",
|
||||
"updated_at": "2020-03-16T11:29:59Z",
|
||||
"pushed_at": "2020-03-10T15:46:18Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-03-15T03:24:46Z",
|
||||
"updated_at": "2020-03-16T11:03:12Z",
|
||||
"pushed_at": "2020-03-04T16:16:58Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-03-16T08:29:47Z",
|
||||
"updated_at": "2020-03-16T13:58:06Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 75,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -157,6 +157,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [Aekras1a/CVE-2020-0796-PoC](https://github.com/Aekras1a/CVE-2020-0796-PoC)
|
||||
- [technion/DisableSMBCompression](https://github.com/technion/DisableSMBCompression)
|
||||
- [cve-2020-0796/cve-2020-0796](https://github.com/cve-2020-0796/cve-2020-0796)
|
||||
- [T13nn3s/CVE-2020-0796](https://github.com/T13nn3s/CVE-2020-0796)
|
||||
- [ollypwn/SMBGhost](https://github.com/ollypwn/SMBGhost)
|
||||
- [joaozietolie/CVE-2020-0796-Checker](https://github.com/joaozietolie/CVE-2020-0796-Checker)
|
||||
- [pr4jwal/CVE-2020-0796](https://github.com/pr4jwal/CVE-2020-0796)
|
||||
|
@ -191,7 +192,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [ran-sama/CVE-2020-0796-PoC-and-Scan](https://github.com/ran-sama/CVE-2020-0796-PoC-and-Scan)
|
||||
|
||||
### CVE-2020-0976
|
||||
- [T13nn3s/CVE-2020-0976](https://github.com/T13nn3s/CVE-2020-0976)
|
||||
- [ericzhong2010/GUI-Check-CVE-2020-0976](https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976)
|
||||
|
||||
### CVE-2020-10238
|
||||
|
|
Loading…
Add table
Reference in a new issue