mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/01/25 00:08:26
This commit is contained in:
parent
1baff1a353
commit
9830c90071
15 changed files with 145 additions and 93 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-3153 aka towelroot",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-24T13:28:00Z",
|
||||
"updated_at": "2019-10-16T04:37:52Z",
|
||||
"updated_at": "2020-01-24T13:53:15Z",
|
||||
"pushed_at": "2017-04-25T07:24:08Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 118,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
|
||||
"fork": false,
|
||||
"created_at": "2014-09-20T08:24:15Z",
|
||||
"updated_at": "2019-10-24T22:20:19Z",
|
||||
"updated_at": "2020-01-24T13:53:14Z",
|
||||
"pushed_at": "2014-10-25T10:45:32Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 42,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-10T23:00:59Z",
|
||||
"updated_at": "2019-12-31T17:36:29Z",
|
||||
"updated_at": "2020-01-24T13:53:18Z",
|
||||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 191,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2020-01-21T15:51:06Z",
|
||||
"updated_at": "2020-01-24T13:52:35Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"forks_count": 148,
|
||||
"forks": 148,
|
||||
"watchers": 327,
|
||||
"watchers": 326,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-08T06:22:07Z",
|
||||
"updated_at": "2019-11-20T17:22:28Z",
|
||||
"updated_at": "2020-01-24T13:51:35Z",
|
||||
"pushed_at": "2016-05-10T22:41:12Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 40,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept code for CVE-2016-5696",
|
||||
"fork": false,
|
||||
"created_at": "2016-08-21T00:17:20Z",
|
||||
"updated_at": "2019-08-17T12:54:19Z",
|
||||
"updated_at": "2020-01-24T13:52:13Z",
|
||||
"pushed_at": "2016-08-24T07:56:39Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 102,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T02:21:28Z",
|
||||
"updated_at": "2019-10-29T07:45:22Z",
|
||||
"updated_at": "2020-01-24T10:54:57Z",
|
||||
"pushed_at": "2019-05-09T07:07:25Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-28T14:45:06Z",
|
||||
"updated_at": "2020-01-24T00:24:55Z",
|
||||
"updated_at": "2020-01-24T14:03:01Z",
|
||||
"pushed_at": "2018-05-08T10:59:23Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 77,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T18:06:10Z",
|
||||
"updated_at": "2020-01-14T14:33:31Z",
|
||||
"updated_at": "2020-01-24T14:23:21Z",
|
||||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-05-23T20:43:58Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit and Mass Pwn3r for CVE-2019-16920",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T17:54:03Z",
|
||||
"updated_at": "2019-12-21T17:31:58Z",
|
||||
"updated_at": "2020-01-24T14:23:43Z",
|
||||
"pushed_at": "2019-12-21T17:31:56Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235991076,
|
||||
"name": "xmlrpc-common-deserialization",
|
||||
"full_name": "orangecertcc\/xmlrpc-common-deserialization",
|
||||
"owner": {
|
||||
"login": "orangecertcc",
|
||||
"id": 48210684,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48210684?v=4",
|
||||
"html_url": "https:\/\/github.com\/orangecertcc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orangecertcc\/xmlrpc-common-deserialization",
|
||||
"description": "CVE-2019-17570 details and proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T11:32:18Z",
|
||||
"updated_at": "2020-01-24T11:52:17Z",
|
||||
"pushed_at": "2020-01-24T11:52:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-01-23T18:12:16Z",
|
||||
"updated_at": "2020-01-24T13:05:13Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 294,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-01-23T21:06:05Z",
|
||||
"updated_at": "2020-01-24T14:44:41Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 444,
|
||||
"watchers": 445,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T23:13:56Z",
|
||||
"updated_at": "2020-01-24T07:31:27Z",
|
||||
"updated_at": "2020-01-24T10:02:47Z",
|
||||
"pushed_at": "2020-01-23T05:55:58Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-01-24T05:33:53Z",
|
||||
"updated_at": "2020-01-24T09:14:15Z",
|
||||
"pushed_at": "2020-01-24T05:33:51Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -749,13 +749,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T23:13:00Z",
|
||||
"updated_at": "2020-01-24T07:52:13Z",
|
||||
"updated_at": "2020-01-24T14:52:54Z",
|
||||
"pushed_at": "2020-01-23T17:38:45Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 25,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -818,8 +818,8 @@
|
|||
"description": "My Citrix ADC NetScaler CVE-2019-19781 Vulnerability DFIR notes. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T08:41:51Z",
|
||||
"updated_at": "2020-01-23T14:45:30Z",
|
||||
"pushed_at": "2020-01-23T14:45:27Z",
|
||||
"updated_at": "2020-01-24T10:45:10Z",
|
||||
"pushed_at": "2020-01-24T10:45:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -841,8 +841,8 @@
|
|||
"description": "a script to look for CVE-2019-19781 Vulnerability within a domain and it's subdomains",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T15:13:04Z",
|
||||
"updated_at": "2020-01-23T15:13:23Z",
|
||||
"pushed_at": "2020-01-23T15:13:21Z",
|
||||
"updated_at": "2020-01-24T14:55:55Z",
|
||||
"pushed_at": "2020-01-24T14:55:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-01-24T06:07:33Z",
|
||||
"updated_at": "2020-01-24T13:35:03Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 712,
|
||||
"watchers_count": 712,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 709,
|
||||
"watchers": 712,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "A PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:15:32Z",
|
||||
"updated_at": "2020-01-23T20:26:53Z",
|
||||
"updated_at": "2020-01-24T13:35:47Z",
|
||||
"pushed_at": "2020-01-17T13:29:44Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,8 +289,8 @@
|
|||
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T15:13:37Z",
|
||||
"updated_at": "2020-01-23T19:48:12Z",
|
||||
"pushed_at": "2020-01-23T19:48:10Z",
|
||||
"updated_at": "2020-01-24T14:23:49Z",
|
||||
"pushed_at": "2020-01-24T14:23:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2020-01-24T01:02:42Z",
|
||||
"updated_at": "2020-01-24T10:47:04Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-01-24T09:02:46Z",
|
||||
"pushed_at": "2020-01-23T22:58:01Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"updated_at": "2020-01-24T14:09:04Z",
|
||||
"pushed_at": "2020-01-24T14:00:39Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T03:52:49Z",
|
||||
"updated_at": "2020-01-24T08:15:51Z",
|
||||
"updated_at": "2020-01-24T14:53:36Z",
|
||||
"pushed_at": "2020-01-24T08:10:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-609.json
Normal file
25
2020/CVE-2020-609.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 236021531,
|
||||
"name": "CVE-2020-609-POC",
|
||||
"full_name": "Bechsen\/CVE-2020-609-POC",
|
||||
"owner": {
|
||||
"login": "Bechsen",
|
||||
"id": 6298298,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6298298?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bechsen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bechsen\/CVE-2020-609-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T14:51:34Z",
|
||||
"updated_at": "2020-01-24T14:51:38Z",
|
||||
"pushed_at": "2020-01-24T14:51:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -4923,6 +4923,7 @@
|
|||
|
||||
### CVE-2019-17570
|
||||
- [r00t4dm/CVE-2019-17570](https://github.com/r00t4dm/CVE-2019-17570)
|
||||
- [orangecertcc/xmlrpc-common-deserialization](https://github.com/orangecertcc/xmlrpc-common-deserialization)
|
||||
|
||||
### CVE-2019-17571
|
||||
- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571)
|
||||
|
@ -5515,6 +5516,9 @@
|
|||
### CVE-2020-5509
|
||||
- [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC)
|
||||
|
||||
### CVE-2020-609
|
||||
- [Bechsen/CVE-2020-609-POC](https://github.com/Bechsen/CVE-2020-609-POC)
|
||||
|
||||
### CVE-2020-6172
|
||||
- [Jeff-Rowell/CVE-2020-6172](https://github.com/Jeff-Rowell/CVE-2020-6172)
|
||||
|
||||
|
|
Loading…
Reference in a new issue