mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/26 18:08:59
This commit is contained in:
parent
2b1cfc556d
commit
979e92ac96
16 changed files with 84 additions and 60 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-25T07:28:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified.",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-27T16:52:23Z",
|
||||
"updated_at": "2020-08-03T09:33:45Z",
|
||||
"updated_at": "2020-09-26T06:53:13Z",
|
||||
"pushed_at": "2019-09-24T21:38:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T08:33:07Z",
|
||||
"updated_at": "2020-09-09T03:34:34Z",
|
||||
"updated_at": "2020-09-26T06:11:58Z",
|
||||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-25T18:50:58Z",
|
||||
"updated_at": "2020-09-26T06:19:22Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1060,
|
||||
"watchers_count": 1060,
|
||||
"stargazers_count": 1061,
|
||||
"watchers_count": 1061,
|
||||
"forks_count": 219,
|
||||
"forks": 219,
|
||||
"watchers": 1060,
|
||||
"watchers": 1061,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-25T20:13:51Z",
|
||||
"updated_at": "2020-09-26T04:35:45Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"stargazers_count": 604,
|
||||
"watchers_count": 604,
|
||||
"forks_count": 170,
|
||||
"forks": 170,
|
||||
"watchers": 603,
|
||||
"watchers": 604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -688,5 +688,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 298771178,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "striveben\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "striveben",
|
||||
"id": 61238912,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/61238912?v=4",
|
||||
"html_url": "https:\/\/github.com\/striveben"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/striveben\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-26T08:31:47Z",
|
||||
"updated_at": "2020-09-26T08:44:44Z",
|
||||
"pushed_at": "2020-09-26T08:44:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2020-09-25T23:46:35Z",
|
||||
"updated_at": "2020-09-26T07:52:43Z",
|
||||
"pushed_at": "2020-09-24T08:47:44Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T04:29:29Z",
|
||||
"updated_at": "2020-09-23T04:34:25Z",
|
||||
"pushed_at": "2020-09-23T04:34:22Z",
|
||||
"updated_at": "2020-09-26T03:43:20Z",
|
||||
"pushed_at": "2020-09-26T03:43:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-25T07:44:09Z",
|
||||
"updated_at": "2020-09-26T04:36:21Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-25T20:53:48Z",
|
||||
"updated_at": "2020-09-25T20:55:58Z",
|
||||
"updated_at": "2020-09-26T07:22:38Z",
|
||||
"pushed_at": "2020-09-25T20:55:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T23:35:22Z",
|
||||
"updated_at": "2020-09-25T23:32:59Z",
|
||||
"updated_at": "2020-09-26T05:41:46Z",
|
||||
"pushed_at": "2020-09-23T14:52:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -525,6 +525,7 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
|
|||
- [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes)
|
||||
- [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472)
|
||||
- [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472)
|
||||
- [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472)
|
||||
|
||||
### CVE-2020-1493
|
||||
|
||||
|
|
Loading…
Reference in a new issue