mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2020/05/29 12:07:51
This commit is contained in:
parent
9b3336c61b
commit
b02f6c4cd8
21 changed files with 108 additions and 84 deletions
2017
2018
2019
CVE-2019-0708.jsonCVE-2019-0859.jsonCVE-2019-12586.jsonCVE-2019-17558.jsonCVE-2019-18634.jsonCVE-2019-19781.jsonCVE-2019-7304.json
2020
CVE-2020-0069.jsonCVE-2020-0609.jsonCVE-2020-0688.jsonCVE-2020-11444.jsonCVE-2020-3153.jsonCVE-2020-3952.jsonCVE-2020-7980.jsonCVE-2020-8617.jsonCVE-2020-9484.json
README.md
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 267752481,
|
||||
"name": "CVE-2017-15944",
|
||||
"full_name": "yukar1z0e\/CVE-2017-15944",
|
||||
"owner": {
|
||||
"login": "yukar1z0e",
|
||||
"id": 44317939,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/44317939?v=4",
|
||||
"html_url": "https:\/\/github.com\/yukar1z0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2017-15944",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-29T03:04:18Z",
|
||||
"updated_at": "2020-05-29T03:04:46Z",
|
||||
"pushed_at": "2020-05-29T03:04:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Demo Application and Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T21:33:25Z",
|
||||
"updated_at": "2019-12-24T22:16:07Z",
|
||||
"updated_at": "2020-05-29T01:57:57Z",
|
||||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1236,8 +1236,8 @@
|
|||
"pushed_at": "2020-01-15T16:12:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-8440 standalone exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T17:00:43Z",
|
||||
"updated_at": "2020-05-28T19:55:44Z",
|
||||
"updated_at": "2020-05-29T01:15:42Z",
|
||||
"pushed_at": "2018-10-31T19:05:17Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1623,13 +1623,13 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2020-05-16T11:02:07Z",
|
||||
"updated_at": "2020-05-29T02:21:31Z",
|
||||
"pushed_at": "2020-05-09T09:49:14Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 325,
|
||||
"watchers": 326,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-0859 1day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-07T04:37:34Z",
|
||||
"updated_at": "2020-05-18T10:43:06Z",
|
||||
"updated_at": "2020-05-29T02:57:26Z",
|
||||
"pushed_at": "2020-02-11T06:46:50Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-05-19T03:26:33Z",
|
||||
"updated_at": "2020-05-29T02:15:39Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 663,
|
||||
"watchers_count": 663,
|
||||
"stargazers_count": 664,
|
||||
"watchers_count": 664,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 663,
|
||||
"watchers": 664,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-28T19:01:58Z",
|
||||
"updated_at": "2020-05-29T03:05:14Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"watchers": 803,
|
||||
"watchers": 806,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2020-05-18T10:43:36Z",
|
||||
"updated_at": "2020-05-29T02:52:18Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-13T10:09:31Z",
|
||||
"updated_at": "2020-05-28T16:47:32Z",
|
||||
"updated_at": "2020-05-29T02:29:09Z",
|
||||
"pushed_at": "2020-01-15T13:58:22Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2020-05-27T21:42:27Z",
|
||||
"updated_at": "2020-05-29T02:26:54Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 509,
|
||||
"watchers": 510,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2020-05-27T04:34:06Z",
|
||||
"updated_at": "2020-05-29T01:20:59Z",
|
||||
"pushed_at": "2020-05-21T19:36:33Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-05-17T03:30:02Z",
|
||||
"updated_at": "2020-05-29T01:56:32Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-05-26T06:27:37Z",
|
||||
"updated_at": "2020-05-28T23:59:22Z",
|
||||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 179,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-28T19:01:58Z",
|
||||
"updated_at": "2020-05-29T03:05:14Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"watchers": 803,
|
||||
"watchers": 806,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T18:59:26Z",
|
||||
"updated_at": "2020-05-28T16:24:44Z",
|
||||
"updated_at": "2020-05-29T02:58:21Z",
|
||||
"pushed_at": "2020-05-25T08:33:24Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-05-21T01:53:17Z",
|
||||
"updated_at": "2020-05-28T22:19:37Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T23:27:20Z",
|
||||
"updated_at": "2020-04-07T20:47:07Z",
|
||||
"updated_at": "2020-05-29T02:17:49Z",
|
||||
"pushed_at": "2020-01-30T11:42:26Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-8617 (BIND)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T12:26:45Z",
|
||||
"updated_at": "2020-05-27T01:57:23Z",
|
||||
"updated_at": "2020-05-29T02:58:19Z",
|
||||
"pushed_at": "2020-05-20T13:03:50Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:30:46Z",
|
||||
"updated_at": "2020-05-28T13:41:00Z",
|
||||
"updated_at": "2020-05-29T02:54:25Z",
|
||||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -8445,6 +8445,7 @@ Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.1
|
|||
|
||||
- [xxnbyy/CVE-2017-15944-POC](https://github.com/xxnbyy/CVE-2017-15944-POC)
|
||||
- [surajraghuvanshi/PaloAltoRceDetectionAndExploit](https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit)
|
||||
- [yukar1z0e/CVE-2017-15944](https://github.com/yukar1z0e/CVE-2017-15944)
|
||||
|
||||
### CVE-2017-16082
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue