mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/02/15 18:09:26
This commit is contained in:
parent
b4c82189e8
commit
880bb25a08
18 changed files with 116 additions and 98 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "OpenSSH 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T21:48:07Z",
|
||||
"updated_at": "2020-10-22T05:34:21Z",
|
||||
"updated_at": "2021-02-15T03:56:48Z",
|
||||
"pushed_at": "2020-10-23T17:03:06Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-02-01T03:25:43Z",
|
||||
"updated_at": "2021-02-15T07:35:04Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 426,
|
||||
"watchers": 427,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T01:20:34Z",
|
||||
"updated_at": "2020-10-01T19:48:21Z",
|
||||
"updated_at": "2021-02-15T07:34:22Z",
|
||||
"pushed_at": "2019-03-01T13:35:59Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2021-01-27T19:33:40Z",
|
||||
"updated_at": "2021-02-15T08:14:12Z",
|
||||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T18:06:10Z",
|
||||
"updated_at": "2021-01-11T19:28:29Z",
|
||||
"updated_at": "2021-02-15T05:44:20Z",
|
||||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2244,13 +2244,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2021-02-06T00:18:51Z",
|
||||
"updated_at": "2021-02-15T08:14:56Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 175,
|
||||
"watchers": 176,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -68,29 +68,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 241412565,
|
||||
"name": "cve-2020-0601_poc",
|
||||
"full_name": "gremwell\/cve-2020-0601_poc",
|
||||
"owner": {
|
||||
"login": "gremwell",
|
||||
"id": 633734,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/633734?v=4",
|
||||
"html_url": "https:\/\/github.com\/gremwell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gremwell\/cve-2020-0601_poc",
|
||||
"description": "CVE-2020-0601 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:36:49Z",
|
||||
"updated_at": "2020-10-14T19:20:02Z",
|
||||
"pushed_at": "2020-02-19T08:46:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243353551,
|
||||
"name": "meetup-2-curveball",
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-01-27T21:52:12Z",
|
||||
"updated_at": "2021-02-15T04:10:14Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"forks_count": 194,
|
||||
"forks": 194,
|
||||
"watchers": 579,
|
||||
"watchers": 580,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-02-14T16:34:22Z",
|
||||
"updated_at": "2021-02-15T04:10:15Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1074,
|
||||
"watchers_count": 1074,
|
||||
"stargazers_count": 1075,
|
||||
"watchers_count": 1075,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1074,
|
||||
"watchers": 1075,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-01-22T07:00:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2020/CVE-2020-14210.json
Normal file
25
2020/CVE-2020-14210.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338973079,
|
||||
"name": "report",
|
||||
"full_name": "monitorapp-aicc\/report",
|
||||
"owner": {
|
||||
"login": "monitorapp-aicc",
|
||||
"id": 79066486,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79066486?v=4",
|
||||
"html_url": "https:\/\/github.com\/monitorapp-aicc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/monitorapp-aicc\/report",
|
||||
"description": "CVE-2020-14210",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T05:08:22Z",
|
||||
"updated_at": "2021-02-15T05:34:03Z",
|
||||
"pushed_at": "2021-02-15T05:08:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -523,8 +523,8 @@
|
|||
"pushed_at": "2021-02-10T02:19:59Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 237289178,
|
||||
"name": "cve-2020-7247-exploit",
|
||||
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
|
||||
"owner": {
|
||||
"login": "FiroSolutions",
|
||||
"id": 43434507,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
|
||||
"html_url": "https:\/\/github.com\/FiroSolutions"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
|
||||
"description": "Python exploit of cve-2020-7247",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-30T19:29:27Z",
|
||||
"updated_at": "2021-02-07T16:45:48Z",
|
||||
"pushed_at": "2020-02-19T10:55:15Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334951447,
|
||||
"name": "CVE-2020-7247",
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2021-02-15T02:12:16Z",
|
||||
"pushed_at": "2021-02-15T02:12:13Z",
|
||||
"updated_at": "2021-02-15T04:14:15Z",
|
||||
"pushed_at": "2021-02-15T04:14:12Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
|
|
25
2020/CVE-2020-8638.json
Normal file
25
2020/CVE-2020-8638.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338988423,
|
||||
"name": "CVE-2020-8638",
|
||||
"full_name": "DXY0411\/CVE-2020-8638",
|
||||
"owner": {
|
||||
"login": "DXY0411",
|
||||
"id": 42259364,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42259364?v=4",
|
||||
"html_url": "https:\/\/github.com\/DXY0411"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DXY0411\/CVE-2020-8638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T06:38:35Z",
|
||||
"updated_at": "2021-02-15T08:46:29Z",
|
||||
"pushed_at": "2021-02-15T08:46:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE in NPM VSCode Extention",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:01:04Z",
|
||||
"updated_at": "2021-02-15T02:29:32Z",
|
||||
"updated_at": "2021-02-15T06:29:31Z",
|
||||
"pushed_at": "2021-02-14T14:01:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -795,13 +795,13 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-02-14T16:15:33Z",
|
||||
"updated_at": "2021-02-15T04:47:50Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 92,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
18
README.md
18
README.md
|
@ -349,7 +349,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
|
||||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
|
||||
- [gremwell/cve-2020-0601_poc](https://github.com/gremwell/cve-2020-0601_poc)
|
||||
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
|
||||
- [exploitblizzard/CVE-2020-0601-spoofkey](https://github.com/exploitblizzard/CVE-2020-0601-spoofkey)
|
||||
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
|
||||
|
@ -1324,7 +1323,6 @@ A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An a
|
|||
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
|
||||
</code>
|
||||
|
||||
- [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit)
|
||||
- [jopraveen/CVE-2020-7247](https://github.com/jopraveen/CVE-2020-7247)
|
||||
- [QTranspose/CVE-2020-7247-exploit](https://github.com/QTranspose/CVE-2020-7247-exploit)
|
||||
|
||||
|
@ -1626,6 +1624,14 @@ Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions o
|
|||
|
||||
- [Al1ex/CVE-2020-8635](https://github.com/Al1ex/CVE-2020-8635)
|
||||
|
||||
### CVE-2020-8638 (2020-04-03)
|
||||
|
||||
<code>
|
||||
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
|
||||
</code>
|
||||
|
||||
- [DXY0411/CVE-2020-8638](https://github.com/DXY0411/CVE-2020-8638)
|
||||
|
||||
### CVE-2020-8809 (2020-02-25)
|
||||
|
||||
<code>
|
||||
|
@ -2633,6 +2639,14 @@ BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit
|
|||
|
||||
- [nondejus/CVE-2020-14199](https://github.com/nondejus/CVE-2020-14199)
|
||||
|
||||
### CVE-2020-14210 (2020-06-16)
|
||||
|
||||
<code>
|
||||
MONITORAPP AIWAF-VE and AIWAF-4000 through 2020-06-16 allow reflected Cross-Site Scripting (XSS) through a crafted URL. This occurs because the Detect URL field displays the original URL.
|
||||
</code>
|
||||
|
||||
- [monitorapp-aicc/report](https://github.com/monitorapp-aicc/report)
|
||||
|
||||
### CVE-2020-14292 (2020-09-09)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue