mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/01/06 06:09:56
This commit is contained in:
parent
4be6229dab
commit
a61cce4784
23 changed files with 189 additions and 67 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2021-01-03T02:35:22Z",
|
||||
"updated_at": "2021-01-05T20:01:24Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2248,
|
||||
"watchers_count": 2248,
|
||||
"stargazers_count": 2247,
|
||||
"watchers_count": 2247,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"watchers": 2248,
|
||||
"watchers": 2247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,8 +174,8 @@
|
|||
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T11:39:11Z",
|
||||
"updated_at": "2021-01-04T20:17:51Z",
|
||||
"pushed_at": "2021-01-04T20:17:49Z",
|
||||
"updated_at": "2021-01-05T20:33:27Z",
|
||||
"pushed_at": "2021-01-05T20:33:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2015-3073 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-27T00:19:23Z",
|
||||
"updated_at": "2019-12-22T22:35:35Z",
|
||||
"updated_at": "2021-01-05T20:22:29Z",
|
||||
"pushed_at": "2015-10-23T23:31:57Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for PlaySMS 1.4 authenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-06T19:16:29Z",
|
||||
"updated_at": "2020-06-27T01:25:41Z",
|
||||
"updated_at": "2021-01-05T19:50:09Z",
|
||||
"pushed_at": "2018-11-06T19:45:40Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-13797.json
Normal file
25
2018/CVE-2018-13797.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327091489,
|
||||
"name": "CVE-2018-13797",
|
||||
"full_name": "dsp-testing\/CVE-2018-13797",
|
||||
"owner": {
|
||||
"login": "dsp-testing",
|
||||
"id": 30846345,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30846345?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsp-testing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-13797",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T18:56:56Z",
|
||||
"updated_at": "2021-01-05T19:33:04Z",
|
||||
"pushed_at": "2021-01-05T19:33:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"forks_count": 376,
|
||||
"forks": 376,
|
||||
"forks_count": 377,
|
||||
"forks": 377,
|
||||
"watchers": 401,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2018/CVE-2018-16460.json
Normal file
25
2018/CVE-2018-16460.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327100385,
|
||||
"name": "CVE-2018-16460",
|
||||
"full_name": "dsp-testing\/CVE-2018-16460",
|
||||
"owner": {
|
||||
"login": "dsp-testing",
|
||||
"id": 30846345,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30846345?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsp-testing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-16460",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T19:36:44Z",
|
||||
"updated_at": "2021-01-05T19:37:05Z",
|
||||
"pushed_at": "2021-01-05T19:37:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -60,11 +60,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2021-01-02T18:17:10Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"pushed_at": "2021-01-05T19:31:09Z",
|
||||
"stargazers_count": 453,
|
||||
"watchers_count": 453,
|
||||
"forks_count": 146,
|
||||
"forks": 146,
|
||||
"forks_count": 147,
|
||||
"forks": 147,
|
||||
"watchers": 453,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "an impacket-dependent script exploiting CVE-2019-1040",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T05:59:06Z",
|
||||
"updated_at": "2021-01-05T03:05:48Z",
|
||||
"updated_at": "2021-01-05T17:42:54Z",
|
||||
"pushed_at": "2021-01-01T06:10:58Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 44,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-05T13:09:06Z",
|
||||
"updated_at": "2021-01-05T16:57:56Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2227,
|
||||
"watchers_count": 2227,
|
||||
"stargazers_count": 2228,
|
||||
"watchers_count": 2228,
|
||||
"forks_count": 632,
|
||||
"forks": 632,
|
||||
"watchers": 2227,
|
||||
"watchers": 2228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-12-28T16:50:47Z",
|
||||
"updated_at": "2021-01-05T15:34:47Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SolarWinds Orion API 远程代码执行漏洞批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T13:42:36Z",
|
||||
"updated_at": "2021-01-05T14:29:56Z",
|
||||
"updated_at": "2021-01-05T15:25:38Z",
|
||||
"pushed_at": "2021-01-05T13:56:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/the-girl-who-lived"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-11539",
|
||||
"description": null,
|
||||
"description": "Improper Access Control in Tata Sonata Smartband",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-05T12:19:19Z",
|
||||
"updated_at": "2020-04-22T11:12:56Z",
|
||||
"updated_at": "2021-01-05T19:29:38Z",
|
||||
"pushed_at": "2020-04-22T11:00:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2021-01-04T19:53:03Z",
|
||||
"updated_at": "2021-01-05T16:40:53Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-05T13:09:06Z",
|
||||
"updated_at": "2021-01-05T16:57:56Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2227,
|
||||
"watchers_count": 2227,
|
||||
"stargazers_count": 2228,
|
||||
"watchers_count": 2228,
|
||||
"forks_count": 632,
|
||||
"forks": 632,
|
||||
"watchers": 2227,
|
||||
"watchers": 2228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2020-12-18T06:12:12Z",
|
||||
"updated_at": "2021-01-05T16:33:50Z",
|
||||
"pushed_at": "2020-07-18T11:52:31Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2021-01-04T02:32:41Z",
|
||||
"updated_at": "2021-01-05T16:41:07Z",
|
||||
"pushed_at": "2020-10-20T20:09:58Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T04:00:29Z",
|
||||
"updated_at": "2021-01-04T03:20:39Z",
|
||||
"updated_at": "2021-01-05T15:35:02Z",
|
||||
"pushed_at": "2020-12-24T06:02:53Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25498.json
Normal file
25
2020/CVE-2020-25498.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327073339,
|
||||
"name": "CVE-2020-25498",
|
||||
"full_name": "the-girl-who-lived\/CVE-2020-25498",
|
||||
"owner": {
|
||||
"login": "the-girl-who-lived",
|
||||
"id": 42164898,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42164898?v=4",
|
||||
"html_url": "https:\/\/github.com\/the-girl-who-lived"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-25498",
|
||||
"description": "Stored XSS via CSRF in Beetel 777VR1 Router ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T17:38:52Z",
|
||||
"updated_at": "2021-01-05T19:48:32Z",
|
||||
"pushed_at": "2021-01-05T19:48:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T14:41:13Z",
|
||||
"updated_at": "2021-01-05T14:47:56Z",
|
||||
"pushed_at": "2021-01-05T14:47:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"updated_at": "2021-01-05T21:00:57Z",
|
||||
"pushed_at": "2021-01-05T15:23:42Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-35262.json
Normal file
25
2020/CVE-2020-35262.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327099437,
|
||||
"name": "CVE-2020-35262",
|
||||
"full_name": "the-girl-who-lived\/CVE-2020-35262",
|
||||
"owner": {
|
||||
"login": "the-girl-who-lived",
|
||||
"id": 42164898,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/42164898?v=4",
|
||||
"html_url": "https:\/\/github.com\/the-girl-who-lived"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-35262",
|
||||
"description": "Cross Site Scripting (XSS) in Digisol DG-HR3400 Router",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T19:32:31Z",
|
||||
"updated_at": "2021-01-05T19:48:54Z",
|
||||
"pushed_at": "2021-01-05T19:46:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2020-12-10T07:56:54Z",
|
||||
"updated_at": "2021-01-05T20:51:26Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
26
README.md
26
README.md
|
@ -3077,6 +3077,9 @@ PHPGURUKUL Zoo Management System Using PHP and MySQL version 1.0 is affected by:
|
|||
### CVE-2020-25488
|
||||
- [Ko-kn3t/CVE-2020-25488](https://github.com/Ko-kn3t/CVE-2020-25488)
|
||||
|
||||
### CVE-2020-25498
|
||||
- [the-girl-who-lived/CVE-2020-25498](https://github.com/the-girl-who-lived/CVE-2020-25498)
|
||||
|
||||
### CVE-2020-25514 (2020-09-22)
|
||||
|
||||
<code>
|
||||
|
@ -3489,7 +3492,10 @@ In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is
|
|||
|
||||
- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669)
|
||||
|
||||
### CVE-2020-35488 (-)
|
||||
### CVE-2020-35262
|
||||
- [the-girl-who-lived/CVE-2020-35262](https://github.com/the-girl-who-lived/CVE-2020-35262)
|
||||
|
||||
### CVE-2020-35488 (2021-01-05)
|
||||
|
||||
<code>
|
||||
The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
|
||||
|
@ -9231,6 +9237,14 @@ PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption
|
|||
|
||||
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
|
||||
|
||||
### CVE-2018-13797 (2018-07-10)
|
||||
|
||||
<code>
|
||||
The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
|
||||
</code>
|
||||
|
||||
- [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797)
|
||||
|
||||
### CVE-2018-13864 (2018-07-17)
|
||||
|
||||
<code>
|
||||
|
@ -9535,6 +9549,14 @@ Frog CMS 0.9.5 has admin/?/user/edit/1 CSRF.
|
|||
|
||||
- [security-breachlock/CVE-2018-16447](https://github.com/security-breachlock/CVE-2018-16447)
|
||||
|
||||
### CVE-2018-16460 (2018-09-07)
|
||||
|
||||
<code>
|
||||
A command Injection in ps package versions <1.0.0 for Node.js allowed arbitrary commands to be executed when attacker controls the PID.
|
||||
</code>
|
||||
|
||||
- [dsp-testing/CVE-2018-16460](https://github.com/dsp-testing/CVE-2018-16460)
|
||||
|
||||
### CVE-2018-16492 (2019-02-01)
|
||||
|
||||
<code>
|
||||
|
@ -12414,7 +12436,7 @@ The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 a
|
|||
### CVE-2017-16995 (2017-12-22)
|
||||
|
||||
<code>
|
||||
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
|
||||
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
|
||||
</code>
|
||||
|
||||
- [C0dak/CVE-2017-16995](https://github.com/C0dak/CVE-2017-16995)
|
||||
|
|
Loading…
Add table
Reference in a new issue