mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/03/07 06:07:42
This commit is contained in:
parent
50ef85dd58
commit
9e8058f6af
15 changed files with 176 additions and 38 deletions
25
2012/CVE-2012-2688.json
Normal file
25
2012/CVE-2012-2688.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 245464308,
|
||||
"name": "CVE-2012-2688",
|
||||
"full_name": "hackerSMinh\/CVE-2012-2688",
|
||||
"owner": {
|
||||
"login": "hackerSMinh",
|
||||
"id": 59408894,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2012-2688",
|
||||
"description": "A CVE-2012-2688 shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:12:39Z",
|
||||
"updated_at": "2020-03-06T17:17:01Z",
|
||||
"pushed_at": "2020-03-06T16:53:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-3245-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T06:49:33Z",
|
||||
"updated_at": "2020-03-03T04:07:27Z",
|
||||
"updated_at": "2020-03-06T17:34:36Z",
|
||||
"pushed_at": "2018-10-27T01:41:18Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 127,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -619,5 +619,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245465268,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "AdriVillaB\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "AdriVillaB",
|
||||
"id": 1714030,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1714030?v=4",
|
||||
"html_url": "https:\/\/github.com\/AdriVillaB"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AdriVillaB\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:17:07Z",
|
||||
"updated_at": "2020-03-06T16:32:41Z",
|
||||
"pushed_at": "2020-03-06T16:32:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2020-02-29T05:57:53Z",
|
||||
"updated_at": "2020-03-06T16:37:20Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1623,13 +1623,13 @@
|
|||
"description": "Porting BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2020-03-05T05:32:09Z",
|
||||
"updated_at": "2020-03-06T15:27:44Z",
|
||||
"pushed_at": "2019-07-20T04:48:43Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 318,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-02-29T20:52:30Z",
|
||||
"updated_at": "2020-03-06T20:18:29Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 15,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245476096,
|
||||
"name": "CVE-2019-11580",
|
||||
"full_name": "hackerSMinh\/CVE-2019-11580",
|
||||
"owner": {
|
||||
"login": "hackerSMinh",
|
||||
"id": 59408894,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2019-11580",
|
||||
"description": "A CVE-2019-11580 shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T17:09:26Z",
|
||||
"updated_at": "2020-03-06T17:15:56Z",
|
||||
"pushed_at": "2020-03-06T17:15:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-03-06T10:02:17Z",
|
||||
"updated_at": "2020-03-06T16:55:56Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2020-01-17T10:18:51Z",
|
||||
"updated_at": "2020-03-06T17:15:35Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "reversing mtk-su",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T22:55:42Z",
|
||||
"updated_at": "2020-03-06T13:03:17Z",
|
||||
"updated_at": "2020-03-06T19:10:15Z",
|
||||
"pushed_at": "2020-03-04T22:32:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read\/execute file,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-03-06T08:07:28Z",
|
||||
"updated_at": "2020-03-06T15:28:06Z",
|
||||
"pushed_at": "2020-02-26T02:58:10Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-03-04T16:16:58Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
}
|
||||
|
|
48
2020/CVE-2020-2555.json
Normal file
48
2020/CVE-2020-2555.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 245452290,
|
||||
"name": "CVE-2020-2555",
|
||||
"full_name": "Hu3sky\/CVE-2020-2555",
|
||||
"owner": {
|
||||
"login": "Hu3sky",
|
||||
"id": 37403964,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37403964?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hu3sky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hu3sky\/CVE-2020-2555",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T15:20:17Z",
|
||||
"updated_at": "2020-03-06T15:43:21Z",
|
||||
"pushed_at": "2020-03-06T15:29:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245462192,
|
||||
"name": "CVE-2020-2555",
|
||||
"full_name": "wsfengfan\/CVE-2020-2555",
|
||||
"owner": {
|
||||
"login": "wsfengfan",
|
||||
"id": 33821840,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
|
||||
"html_url": "https:\/\/github.com\/wsfengfan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wsfengfan\/CVE-2020-2555",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2020-03-06T16:05:00Z",
|
||||
"pushed_at": "2020-03-06T16:04:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-8597",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T08:37:50Z",
|
||||
"updated_at": "2020-03-06T13:45:19Z",
|
||||
"updated_at": "2020-03-06T19:38:30Z",
|
||||
"pushed_at": "2020-03-06T13:27:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
19
README.md
19
README.md
|
@ -184,6 +184,15 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [0nise/CVE-2020-2551](https://github.com/0nise/CVE-2020-2551)
|
||||
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551)
|
||||
|
||||
### CVE-2020-2555
|
||||
|
||||
<code>
|
||||
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.17, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [Hu3sky/CVE-2020-2555](https://github.com/Hu3sky/CVE-2020-2555)
|
||||
- [wsfengfan/CVE-2020-2555](https://github.com/wsfengfan/CVE-2020-2555)
|
||||
|
||||
### CVE-2020-2655
|
||||
|
||||
<code>
|
||||
|
@ -1020,6 +1029,7 @@ Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin inco
|
|||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580)
|
||||
- [hackerSMinh/CVE-2019-11580](https://github.com/hackerSMinh/CVE-2019-11580)
|
||||
|
||||
### CVE-2019-11581
|
||||
|
||||
|
@ -5848,6 +5858,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [sdosis/cve-2018-6574](https://github.com/sdosis/cve-2018-6574)
|
||||
- [No1zy/CVE-2018-6574-PoC](https://github.com/No1zy/CVE-2018-6574-PoC)
|
||||
- [nthuong95/CVE-2018-6574](https://github.com/nthuong95/CVE-2018-6574)
|
||||
- [AdriVillaB/CVE-2018-6574](https://github.com/AdriVillaB/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622
|
||||
|
||||
|
@ -11561,6 +11572,14 @@ sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6
|
|||
|
||||
- [Avinza/CVE-2012-2122-scanner](https://github.com/Avinza/CVE-2012-2122-scanner)
|
||||
|
||||
### CVE-2012-2688
|
||||
|
||||
<code>
|
||||
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
|
||||
</code>
|
||||
|
||||
- [hackerSMinh/CVE-2012-2688](https://github.com/hackerSMinh/CVE-2012-2688)
|
||||
|
||||
### CVE-2012-3137
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue