mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/02/17 18:08:58
This commit is contained in:
parent
f6fdfc4355
commit
995aec3166
18 changed files with 103 additions and 70 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-02-03T23:57:06Z",
|
||||
"updated_at": "2021-02-17T08:36:51Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2015/CVE-2015-1769.json
Normal file
25
2015/CVE-2015-1769.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 339600302,
|
||||
"name": "CVE-2015-1769",
|
||||
"full_name": "int0\/CVE-2015-1769",
|
||||
"owner": {
|
||||
"login": "int0",
|
||||
"id": 3078184,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3078184?v=4",
|
||||
"html_url": "https:\/\/github.com\/int0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/int0\/CVE-2015-1769",
|
||||
"description": "PoC for CVE-2015-1769",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-17T03:25:53Z",
|
||||
"updated_at": "2021-02-17T03:45:51Z",
|
||||
"pushed_at": "2021-02-17T03:45:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2021-02-06T06:08:29Z",
|
||||
"updated_at": "2021-02-17T06:48:58Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2021-01-24T17:05:53Z",
|
||||
"updated_at": "2021-02-17T06:49:27Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2021-02-15T08:14:12Z",
|
||||
"updated_at": "2021-02-17T07:34:22Z",
|
||||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2019-14899",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T19:05:19Z",
|
||||
"updated_at": "2020-11-15T16:49:55Z",
|
||||
"pushed_at": "2020-01-18T19:09:07Z",
|
||||
"updated_at": "2021-02-17T04:42:24Z",
|
||||
"pushed_at": "2021-02-17T04:42:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-02-15T14:57:10Z",
|
||||
"updated_at": "2021-02-17T04:32:35Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2335,
|
||||
"watchers_count": 2335,
|
||||
"forks_count": 659,
|
||||
"forks": 659,
|
||||
"watchers": 2335,
|
||||
"stargazers_count": 2336,
|
||||
"watchers_count": 2336,
|
||||
"forks_count": 660,
|
||||
"forks": 660,
|
||||
"watchers": 2336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-02-14T02:15:44Z",
|
||||
"updated_at": "2021-02-17T08:38:14Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 717,
|
||||
"watchers_count": 717,
|
||||
"stargazers_count": 718,
|
||||
"watchers_count": 718,
|
||||
"forks_count": 150,
|
||||
"forks": 150,
|
||||
"watchers": 717,
|
||||
"watchers": 718,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 499,
|
||||
"watchers_count": 499,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 499,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1239,
|
||||
"watchers_count": 1239,
|
||||
"forks_count": 287,
|
||||
"forks": 287,
|
||||
"forks_count": 288,
|
||||
"forks": 288,
|
||||
"watchers": 1239,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-02-15T14:57:10Z",
|
||||
"updated_at": "2021-02-17T04:32:35Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2335,
|
||||
"watchers_count": 2335,
|
||||
"forks_count": 659,
|
||||
"forks": 659,
|
||||
"watchers": 2335,
|
||||
"stargazers_count": 2336,
|
||||
"watchers_count": 2336,
|
||||
"forks_count": 660,
|
||||
"forks": 660,
|
||||
"watchers": 2336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2021-02-15T15:41:53Z",
|
||||
"updated_at": "2021-02-17T07:03:02Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 259,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2021-02-16T16:28:35Z",
|
||||
"updated_at": "2021-02-17T03:28:57Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-16T16:55:46Z",
|
||||
"updated_at": "2021-02-16T19:09:52Z",
|
||||
"updated_at": "2021-02-17T03:25:07Z",
|
||||
"pushed_at": "2021-02-16T16:59:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-02-16T20:36:58Z",
|
||||
"updated_at": "2021-02-17T04:46:38Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE in NPM VSCode Extention",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:01:04Z",
|
||||
"updated_at": "2021-02-16T22:46:47Z",
|
||||
"updated_at": "2021-02-17T03:31:12Z",
|
||||
"pushed_at": "2021-02-14T14:01:40Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-12T07:32:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-16T22:31:52Z",
|
||||
"updated_at": "2021-02-17T04:30:25Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -795,13 +795,13 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-02-16T10:44:55Z",
|
||||
"updated_at": "2021-02-17T03:23:22Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14295,6 +14295,14 @@ Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vist
|
|||
|
||||
- [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701)
|
||||
|
||||
### CVE-2015-1769 (2015-08-14)
|
||||
|
||||
<code>
|
||||
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability."
|
||||
</code>
|
||||
|
||||
- [int0/CVE-2015-1769](https://github.com/int0/CVE-2015-1769)
|
||||
|
||||
### CVE-2015-1805 (2015-08-08)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue