mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/06/26 00:08:10
This commit is contained in:
parent
0d2d271e5f
commit
9ecc198c25
21 changed files with 60 additions and 201 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 90186634,
|
||||
"name": "CVE-2008-1613",
|
||||
"full_name": "SECFORCE\/CVE-2008-1613",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
|
||||
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-03T19:39:27Z",
|
||||
"updated_at": "2020-05-18T10:42:05Z",
|
||||
"pushed_at": "2017-05-03T19:40:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 70811001,
|
||||
"name": "Offensive",
|
||||
"full_name": "Naramsim\/Offensive",
|
||||
"owner": {
|
||||
"login": "Naramsim",
|
||||
"id": 8996268,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8996268?v=4",
|
||||
"html_url": "https:\/\/github.com\/Naramsim"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Naramsim\/Offensive",
|
||||
"description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-13T13:46:46Z",
|
||||
"updated_at": "2018-09-01T03:40:31Z",
|
||||
"pushed_at": "2017-01-11T15:50:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 58223324,
|
||||
"name": "sockstress",
|
||||
"full_name": "marcelki\/sockstress",
|
||||
"owner": {
|
||||
"login": "marcelki",
|
||||
"id": 8465322,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
|
||||
"html_url": "https:\/\/github.com\/marcelki"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marcelki\/sockstress",
|
||||
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-06T17:21:32Z",
|
||||
"updated_at": "2020-06-04T09:57:06Z",
|
||||
"pushed_at": "2016-07-02T18:52:16Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 127826773,
|
||||
"name": "CVE-2008-6827",
|
||||
"full_name": "alt3kx\/CVE-2008-6827",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827",
|
||||
"description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-03T00:08:23Z",
|
||||
"updated_at": "2018-05-04T02:30:55Z",
|
||||
"pushed_at": "2018-05-04T02:30:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 58135743,
|
||||
"name": "CVE-2008-6970",
|
||||
"full_name": "KyomaHooin\/CVE-2008-6970",
|
||||
"owner": {
|
||||
"login": "KyomaHooin",
|
||||
"id": 19186867,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19186867?v=4",
|
||||
"html_url": "https:\/\/github.com\/KyomaHooin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970",
|
||||
"description": "Blind SQL injection brute force.",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-05T14:13:33Z",
|
||||
"updated_at": "2018-05-11T08:02:20Z",
|
||||
"pushed_at": "2018-05-11T08:02:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-08T15:10:38Z",
|
||||
"updated_at": "2020-06-23T01:15:18Z",
|
||||
"updated_at": "2020-06-25T09:27:10Z",
|
||||
"pushed_at": "2020-06-19T15:12:31Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for PlaySMS 1.4 authenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-06T19:16:29Z",
|
||||
"updated_at": "2020-05-12T02:55:07Z",
|
||||
"updated_at": "2020-06-25T13:25:42Z",
|
||||
"pushed_at": "2018-11-06T19:45:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 274906170,
|
||||
"name": "DrupalCVE-2018-7602",
|
||||
"full_name": "cyberharsh\/DrupalCVE-2018-7602",
|
||||
"owner": {
|
||||
"login": "cyberharsh",
|
||||
"id": 57433814,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57433814?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyberharsh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyberharsh\/DrupalCVE-2018-7602",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T12:06:07Z",
|
||||
"updated_at": "2020-06-25T12:11:52Z",
|
||||
"pushed_at": "2020-06-25T12:11:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-19T18:02:31Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2020-06-24T11:36:56Z",
|
||||
"pushed_at": "2020-06-24T11:38:49Z",
|
||||
"pushed_at": "2020-06-25T11:27:53Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -1186,13 +1186,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-06-25T07:18:52Z",
|
||||
"updated_at": "2020-06-25T11:38:08Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 276,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T18:45:24Z",
|
||||
"updated_at": "2020-06-23T19:07:23Z",
|
||||
"pushed_at": "2020-06-23T19:07:20Z",
|
||||
"updated_at": "2020-06-25T12:22:09Z",
|
||||
"pushed_at": "2020-06-25T12:22:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -10,16 +10,16 @@
|
|||
"html_url": "https:\/\/github.com\/spaceraccoon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/spaceraccoon\/CVE-2020-10665",
|
||||
"description": null,
|
||||
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T07:35:29Z",
|
||||
"updated_at": "2020-06-25T07:49:37Z",
|
||||
"updated_at": "2020-06-25T13:56:22Z",
|
||||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-19T21:24:19Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
41
README.md
41
README.md
|
@ -7428,6 +7428,7 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
|
|||
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
|
||||
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
|
||||
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
||||
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
||||
|
||||
### CVE-2018-7690
|
||||
|
||||
|
@ -13710,22 +13711,6 @@ Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote atta
|
|||
|
||||
- [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
|
||||
|
||||
### CVE-2008-1613
|
||||
|
||||
<code>
|
||||
SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
|
||||
|
||||
### CVE-2008-2938
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
|
||||
</code>
|
||||
|
||||
- [Naramsim/Offensive](https://github.com/Naramsim/Offensive)
|
||||
|
||||
### CVE-2008-4250
|
||||
|
||||
<code>
|
||||
|
@ -13734,14 +13719,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
|
|||
|
||||
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
|
||||
|
||||
### CVE-2008-4609
|
||||
|
||||
<code>
|
||||
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
|
||||
</code>
|
||||
|
||||
- [marcelki/sockstress](https://github.com/marcelki/sockstress)
|
||||
|
||||
### CVE-2008-4654
|
||||
|
||||
<code>
|
||||
|
@ -13767,22 +13744,6 @@ Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.203
|
|||
|
||||
- [SECFORCE/CVE-2008-5416](https://github.com/SECFORCE/CVE-2008-5416)
|
||||
|
||||
### CVE-2008-6827
|
||||
|
||||
<code>
|
||||
The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a "Shatter" style attack on the "command prompt" hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2008-6827](https://github.com/alt3kx/CVE-2008-6827)
|
||||
|
||||
### CVE-2008-6970
|
||||
|
||||
<code>
|
||||
SQL injection vulnerability in dosearch.inc.php in UBB.threads 7.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the Forum[] array parameter.
|
||||
</code>
|
||||
|
||||
- [KyomaHooin/CVE-2008-6970](https://github.com/KyomaHooin/CVE-2008-6970)
|
||||
|
||||
### CVE-2008-7220
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue