mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/09/10 00:09:54
This commit is contained in:
parent
991ef6a552
commit
8fb114b1ca
21 changed files with 368 additions and 54 deletions
25
2015/CVE-2015-0006.json
Normal file
25
2015/CVE-2015-0006.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 19259219,
|
||||
"name": "imposter",
|
||||
"full_name": "bugch3ck\/imposter",
|
||||
"owner": {
|
||||
"login": "bugch3ck",
|
||||
"id": 4165895,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4",
|
||||
"html_url": "https:\/\/github.com\/bugch3ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bugch3ck\/imposter",
|
||||
"description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-29T01:05:57Z",
|
||||
"updated_at": "2018-06-26T21:10:14Z",
|
||||
"pushed_at": "2014-06-07T23:45:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,188 @@
|
|||
[
|
||||
{
|
||||
"id": 29925728,
|
||||
"name": "ghost-checker",
|
||||
"full_name": "fser\/ghost-checker",
|
||||
"owner": {
|
||||
"login": "fser",
|
||||
"id": 774138,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4",
|
||||
"html_url": "https:\/\/github.com\/fser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fser\/ghost-checker",
|
||||
"description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T17:31:33Z",
|
||||
"updated_at": "2018-05-15T04:55:01Z",
|
||||
"pushed_at": "2015-01-27T17:35:16Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29933656,
|
||||
"name": "CVE-2015-0235-cookbook",
|
||||
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
|
||||
"owner": {
|
||||
"login": "mikesplain",
|
||||
"id": 881965,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4",
|
||||
"html_url": "https:\/\/github.com\/mikesplain"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
|
||||
"description": "A chef cookbook to test the GHOST vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T20:34:42Z",
|
||||
"updated_at": "2017-09-29T11:32:54Z",
|
||||
"pushed_at": "2015-01-27T21:41:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29941036,
|
||||
"name": "CVE-2015-0235-test",
|
||||
"full_name": "aaronfay\/CVE-2015-0235-test",
|
||||
"owner": {
|
||||
"login": "aaronfay",
|
||||
"id": 1033941,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4",
|
||||
"html_url": "https:\/\/github.com\/aaronfay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
|
||||
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T23:45:22Z",
|
||||
"updated_at": "2016-08-31T16:50:49Z",
|
||||
"pushed_at": "2015-01-29T03:33:29Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29942046,
|
||||
"name": "ghost",
|
||||
"full_name": "piyokango\/ghost",
|
||||
"owner": {
|
||||
"login": "piyokango",
|
||||
"id": 10733273,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4",
|
||||
"html_url": "https:\/\/github.com\/piyokango"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/piyokango\/ghost",
|
||||
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T00:14:35Z",
|
||||
"updated_at": "2015-08-13T21:27:35Z",
|
||||
"pushed_at": "2015-01-28T14:29:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29948700,
|
||||
"name": "GHOSTCHECK-cve-2015-0235",
|
||||
"full_name": "LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
|
||||
"owner": {
|
||||
"login": "LyricalSecurity",
|
||||
"id": 10375093,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10375093?v=4",
|
||||
"html_url": "https:\/\/github.com\/LyricalSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T03:30:21Z",
|
||||
"updated_at": "2020-04-23T22:26:31Z",
|
||||
"pushed_at": "2015-01-28T15:10:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29950345,
|
||||
"name": "CVE-2015-0235_GHOST",
|
||||
"full_name": "mholzinger\/CVE-2015-0235_GHOST",
|
||||
"owner": {
|
||||
"login": "mholzinger",
|
||||
"id": 235958,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4",
|
||||
"html_url": "https:\/\/github.com\/mholzinger"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T04:22:05Z",
|
||||
"updated_at": "2016-02-26T05:46:40Z",
|
||||
"pushed_at": "2015-01-28T05:26:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29988916,
|
||||
"name": "ansible-CVE-2015-0235-GHOST",
|
||||
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
|
||||
"owner": {
|
||||
"login": "adherzog",
|
||||
"id": 1744181,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4",
|
||||
"html_url": "https:\/\/github.com\/adherzog"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
|
||||
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T21:22:33Z",
|
||||
"updated_at": "2015-01-28T21:23:35Z",
|
||||
"pushed_at": "2015-01-28T21:23:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29993101,
|
||||
"name": "lenny-libc6",
|
||||
"full_name": "favoretti\/lenny-libc6",
|
||||
"owner": {
|
||||
"login": "favoretti",
|
||||
"id": 805046,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4",
|
||||
"html_url": "https:\/\/github.com\/favoretti"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/favoretti\/lenny-libc6",
|
||||
"description": "CVE-2015-0235 patches lenny libc6 packages for amd64",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T23:09:13Z",
|
||||
"updated_at": "2015-01-28T23:09:13Z",
|
||||
"pushed_at": "2015-01-28T23:11:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30004399,
|
||||
"name": "cfengine-CVE_2015_0235",
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2020-09-06T20:27:30Z",
|
||||
"updated_at": "2020-09-09T14:57:12Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 674,
|
||||
"watchers_count": 674,
|
||||
"stargazers_count": 675,
|
||||
"watchers_count": 675,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"watchers": 674,
|
||||
"watchers": 675,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-01-11T09:23:05Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2019-0230 & s2-059 poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-20T08:21:54Z",
|
||||
"updated_at": "2020-09-02T08:46:10Z",
|
||||
"updated_at": "2020-09-09T09:44:35Z",
|
||||
"pushed_at": "2020-08-21T12:41:14Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
|
|
|
@ -979,13 +979,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2020-08-02T02:06:59Z",
|
||||
"updated_at": "2020-09-09T14:43:43Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"stargazers_count": 466,
|
||||
"watchers_count": 466,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 467,
|
||||
"watchers": 466,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1094,13 +1094,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-09-08T06:51:46Z",
|
||||
"updated_at": "2020-09-09T14:43:43Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1118,
|
||||
"watchers_count": 1118,
|
||||
"stargazers_count": 1117,
|
||||
"watchers_count": 1117,
|
||||
"forks_count": 380,
|
||||
"forks": 380,
|
||||
"watchers": 1118,
|
||||
"watchers": 1117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-09-02T23:29:27Z",
|
||||
"updated_at": "2020-09-09T13:43:30Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 672,
|
||||
"watchers_count": 672,
|
||||
"stargazers_count": 673,
|
||||
"watchers_count": 673,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 672,
|
||||
"watchers": 673,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2020-08-26T07:04:54Z",
|
||||
"updated_at": "2020-09-09T14:43:43Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 238,
|
||||
"watchers": 237,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -266,8 +266,8 @@
|
|||
"description": "(CVE-2019-16759) vBulletin_Routestring-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T13:44:15Z",
|
||||
"updated_at": "2020-09-03T14:47:06Z",
|
||||
"pushed_at": "2020-09-03T14:32:40Z",
|
||||
"updated_at": "2020-09-09T09:35:35Z",
|
||||
"pushed_at": "2020-09-09T09:35:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-09T01:58:05Z",
|
||||
"updated_at": "2020-09-09T14:38:54Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1589,
|
||||
"watchers_count": 1589,
|
||||
"stargazers_count": 1590,
|
||||
"watchers_count": 1590,
|
||||
"forks_count": 423,
|
||||
"forks": 423,
|
||||
"watchers": 1589,
|
||||
"watchers": 1590,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-09-08T09:45:52Z",
|
||||
"updated_at": "2020-09-09T09:37:55Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 529,
|
||||
"watchers": 530,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1049,7 +1049,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-08-25T06:24:43Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"pushed_at": "2020-09-09T09:42:22Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 16,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T15:52:43Z",
|
||||
"updated_at": "2020-09-05T18:42:32Z",
|
||||
"updated_at": "2020-09-09T14:06:59Z",
|
||||
"pushed_at": "2020-06-09T20:41:32Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-09-07T06:42:37Z",
|
||||
"updated_at": "2020-09-09T13:35:41Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-13933.json
Normal file
25
2020/CVE-2020-13933.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 294077686,
|
||||
"name": "CVE-2020-13933",
|
||||
"full_name": "lyy289065406\/CVE-2020-13933",
|
||||
"owner": {
|
||||
"login": "lyy289065406",
|
||||
"id": 17040287,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17040287?v=4",
|
||||
"html_url": "https:\/\/github.com\/lyy289065406"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lyy289065406\/CVE-2020-13933",
|
||||
"description": "CVE-2020-13933 靶场: shiro < 1.6.0 认证绕过漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-09T10:20:25Z",
|
||||
"updated_at": "2020-09-09T10:47:53Z",
|
||||
"pushed_at": "2020-09-09T10:47:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-10T10:49:38Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-09-08T10:42:27Z",
|
||||
"updated_at": "2020-09-09T09:16:38Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-09T01:58:05Z",
|
||||
"updated_at": "2020-09-09T14:38:54Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1589,
|
||||
"watchers_count": 1589,
|
||||
"stargazers_count": 1590,
|
||||
"watchers_count": 1590,
|
||||
"forks_count": 423,
|
||||
"forks": 423,
|
||||
"watchers": 1589,
|
||||
"watchers": 1590,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-8150.json
Normal file
25
2020/CVE-2020-8150.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 294140303,
|
||||
"name": "CVE-2020-8150",
|
||||
"full_name": "geffner\/CVE-2020-8150",
|
||||
"owner": {
|
||||
"login": "geffner",
|
||||
"id": 4524253,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4524253?v=4",
|
||||
"html_url": "https:\/\/github.com\/geffner"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geffner\/CVE-2020-8150",
|
||||
"description": "CVE-2020-8150 – Remote Code Execution as SYSTEM\/root via Backblaze",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-09T14:39:16Z",
|
||||
"updated_at": "2020-09-09T14:41:50Z",
|
||||
"pushed_at": "2020-09-09T14:41:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-8152.json
Normal file
25
2020/CVE-2020-8152.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 294141202,
|
||||
"name": "CVE-2020-8152",
|
||||
"full_name": "geffner\/CVE-2020-8152",
|
||||
"owner": {
|
||||
"login": "geffner",
|
||||
"id": 4524253,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4524253?v=4",
|
||||
"html_url": "https:\/\/github.com\/geffner"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geffner\/CVE-2020-8152",
|
||||
"description": "CVE-2020-8152 – Elevation of Privilege in Backblaze",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-09T14:42:36Z",
|
||||
"updated_at": "2020-09-09T14:43:36Z",
|
||||
"pushed_at": "2020-09-09T14:43:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
README.md
30
README.md
|
@ -1067,6 +1067,12 @@ A vulnerability in the improper handling of symbolic links in Bitdefender Antivi
|
|||
|
||||
- [RedyOpsResearchLabs/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP](https://github.com/RedyOpsResearchLabs/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP)
|
||||
|
||||
### CVE-2020-8150
|
||||
- [geffner/CVE-2020-8150](https://github.com/geffner/CVE-2020-8150)
|
||||
|
||||
### CVE-2020-8152
|
||||
- [geffner/CVE-2020-8152](https://github.com/geffner/CVE-2020-8152)
|
||||
|
||||
### CVE-2020-8163
|
||||
|
||||
<code>
|
||||
|
@ -1872,6 +1878,14 @@ Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the
|
|||
|
||||
- [bit4woo/CVE-2020-13925](https://github.com/bit4woo/CVE-2020-13925)
|
||||
|
||||
### CVE-2020-13933
|
||||
|
||||
<code>
|
||||
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
|
||||
</code>
|
||||
|
||||
- [lyy289065406/CVE-2020-13933](https://github.com/lyy289065406/CVE-2020-13933)
|
||||
|
||||
### CVE-2020-13996
|
||||
|
||||
<code>
|
||||
|
@ -11967,6 +11981,14 @@ Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing
|
|||
|
||||
|
||||
## 2015
|
||||
### CVE-2015-0006
|
||||
|
||||
<code>
|
||||
The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability."
|
||||
</code>
|
||||
|
||||
- [bugch3ck/imposter](https://github.com/bugch3ck/imposter)
|
||||
|
||||
### CVE-2015-0057
|
||||
|
||||
<code>
|
||||
|
@ -12008,6 +12030,14 @@ Use-after-free vulnerability in the process_nested_data function in ext/standard
|
|||
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
|
||||
</code>
|
||||
|
||||
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
|
||||
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
|
||||
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
|
||||
- [piyokango/ghost](https://github.com/piyokango/ghost)
|
||||
- [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235)
|
||||
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
|
||||
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
|
||||
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
|
||||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
|
|
Loading…
Add table
Reference in a new issue