mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/10/31 00:09:05
This commit is contained in:
parent
beb7d19d59
commit
b3d62c81ef
23 changed files with 143 additions and 86 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-09-20T05:13:51Z",
|
||||
"updated_at": "2020-10-30T14:13:27Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 540,
|
||||
"watchers_count": 540,
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 540,
|
||||
"watchers": 539,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2020-09-30T09:18:07Z",
|
||||
"updated_at": "2020-10-30T13:49:34Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 232,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-18T19:24:48Z",
|
||||
"updated_at": "2020-06-11T00:46:08Z",
|
||||
"updated_at": "2020-10-30T12:56:43Z",
|
||||
"pushed_at": "2020-06-11T00:46:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-09-20T05:13:51Z",
|
||||
"updated_at": "2020-10-30T14:13:27Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 540,
|
||||
"watchers_count": 540,
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 540,
|
||||
"watchers": 539,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1075,8 +1075,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1123,
|
||||
"watchers_count": 1123,
|
||||
"forks_count": 378,
|
||||
"forks": 378,
|
||||
"forks_count": 379,
|
||||
"forks": 379,
|
||||
"watchers": 1123,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1278,13 +1278,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-10-27T07:40:26Z",
|
||||
"updated_at": "2020-10-30T13:27:00Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 767,
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 768,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CuteNews Avatar 2.1.2 Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T08:21:46Z",
|
||||
"updated_at": "2020-10-30T09:03:31Z",
|
||||
"updated_at": "2020-10-30T09:11:06Z",
|
||||
"pushed_at": "2020-10-30T09:03:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-30T09:05:48Z",
|
||||
"updated_at": "2020-10-30T13:33:20Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1987,
|
||||
"watchers_count": 1987,
|
||||
"stargazers_count": 1988,
|
||||
"watchers_count": 1988,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 1987,
|
||||
"watchers": 1988,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-10-29T08:56:37Z",
|
||||
"updated_at": "2020-10-30T13:45:13Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 105,
|
||||
"forks": 105,
|
||||
"watchers": 403,
|
||||
"watchers": 402,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-10-29T11:07:51Z",
|
||||
"updated_at": "2020-10-30T14:40:42Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 843,
|
||||
"watchers_count": 843,
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 843,
|
||||
"watchers": 844,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1347,13 +1347,13 @@
|
|||
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-19T20:38:11Z",
|
||||
"updated_at": "2020-07-12T04:19:41Z",
|
||||
"updated_at": "2020-10-30T11:16:01Z",
|
||||
"pushed_at": "2020-06-19T20:58:36Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-26T17:07:28Z",
|
||||
"updated_at": "2020-10-28T09:45:43Z",
|
||||
"pushed_at": "2020-10-28T09:45:41Z",
|
||||
"updated_at": "2020-10-30T09:36:26Z",
|
||||
"pushed_at": "2020-10-30T09:36:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-07-20T03:51:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 684,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-10-29T01:54:47Z",
|
||||
"updated_at": "2020-10-30T09:30:18Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-10-30T08:58:43Z",
|
||||
"updated_at": "2020-10-30T14:18:58Z",
|
||||
"pushed_at": "2020-10-30T08:58:41Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882 by Jang",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T21:28:12Z",
|
||||
"updated_at": "2020-10-30T04:52:09Z",
|
||||
"updated_at": "2020-10-30T15:11:08Z",
|
||||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -136,5 +136,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308605927,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "alexfrancow\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "alexfrancow",
|
||||
"id": 23419929,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexfrancow"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T11:07:11Z",
|
||||
"updated_at": "2020-10-30T11:27:42Z",
|
||||
"pushed_at": "2020-10-30T11:27:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-15999",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T16:16:25Z",
|
||||
"updated_at": "2020-10-29T21:55:10Z",
|
||||
"pushed_at": "2020-10-29T21:55:08Z",
|
||||
"updated_at": "2020-10-30T11:16:07Z",
|
||||
"pushed_at": "2020-10-30T11:16:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-10-14T16:56:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2020-10-29T21:46:45Z",
|
||||
"updated_at": "2020-10-30T13:55:56Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-27976.json
Normal file
25
2020/CVE-2020-27976.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 308646506,
|
||||
"name": "CVE-2020-27976",
|
||||
"full_name": "k0rnh0li0\/CVE-2020-27976",
|
||||
"owner": {
|
||||
"login": "k0rnh0li0",
|
||||
"id": 73505124,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/73505124?v=4",
|
||||
"html_url": "https:\/\/github.com\/k0rnh0li0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k0rnh0li0\/CVE-2020-27976",
|
||||
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T13:59:23Z",
|
||||
"updated_at": "2020-10-30T14:18:08Z",
|
||||
"pushed_at": "2020-10-30T14:18:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-10-26T09:23:28Z",
|
||||
"updated_at": "2020-10-30T13:06:00Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-30T09:05:48Z",
|
||||
"updated_at": "2020-10-30T13:33:20Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1987,
|
||||
"watchers_count": 1987,
|
||||
"stargazers_count": 1988,
|
||||
"watchers_count": 1988,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 1987,
|
||||
"watchers": 1988,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2178,6 +2178,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [RedTeamWing/CVE-2020-14882](https://github.com/RedTeamWing/CVE-2020-14882)
|
||||
- [0thm4n3/cve-2020-14882](https://github.com/0thm4n3/cve-2020-14882)
|
||||
- [wsfengfan/cve-2020-14882](https://github.com/wsfengfan/cve-2020-14882)
|
||||
- [alexfrancow/CVE-2020-14882](https://github.com/alexfrancow/CVE-2020-14882)
|
||||
|
||||
### CVE-2020-14947 (2020-06-30)
|
||||
|
||||
|
@ -2654,6 +2655,14 @@ An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the u
|
|||
|
||||
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
|
||||
|
||||
### CVE-2020-27976 (2020-10-28)
|
||||
|
||||
<code>
|
||||
osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.
|
||||
</code>
|
||||
|
||||
- [k0rnh0li0/CVE-2020-27976](https://github.com/k0rnh0li0/CVE-2020-27976)
|
||||
|
||||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
|
|
Loading…
Reference in a new issue